WO2001041380A2 - Characteristic routing - Google Patents
Characteristic routing Download PDFInfo
- Publication number
- WO2001041380A2 WO2001041380A2 PCT/US2000/032514 US0032514W WO0141380A2 WO 2001041380 A2 WO2001041380 A2 WO 2001041380A2 US 0032514 W US0032514 W US 0032514W WO 0141380 A2 WO0141380 A2 WO 0141380A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- packet
- node
- characteristic
- routing
- network
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/04—Interdomain routing, e.g. hierarchical routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/26—Route discovery packet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/30—Managing network names, e.g. use of aliases or nicknames
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/35—Network arrangements, protocols or services for addressing or naming involving non-standard use of addresses for implementing network functionalities, e.g. coding subscription information within the address or functional addressing, i.e. assigning an address to a function
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/30—Types of network names
- H04L2101/365—Application layer names, e.g. buddy names, unstructured names chosen by a user or home appliance name
Definitions
- the present invention relates to network data transport. More specifically, the invention relates to a network routing protocol that enables particularly fast multi-hop routing of data over an internetwork from a sender node to a set of multiple destination nodes using a description of set of destination nodes in the form of multiple identifying descriptive names or "characteristics.”
- link-state routing the most common instantiation of link-state routing is Open Shortest Path First (OSPF), such as described by J. Moy in RFC 2328 entitled “OSPF Version 2" (April 1998), and a similar version of link-state routing also is described in U.S. Patent No. 5,128,926 issued to Perlman et al.
- OSPF Open Shortest Path First
- each router gathers information a priori about the topology of the network and then distills from that information a unicast routing table. The routers could then use this information to determine the best path from the sender to the receiver, and the original network topology information is retained by the routers.
- the information gathered about the network could include preferred routes or multicast membership (such as described by J. Moy in RFC 1585 entitled “MOSPF: Analysis and Experience” (March 1994)). All hosts and networks are assumed to have only a single primary address. Accordingly, unicasting is limited to providing routing of data by a sender over an internetwork only to one destination node based on that node's unique address.
- the single primary address as destination is assumed to be the general case, and the routing protocols are optimized to make this single address destination case work best.
- the link-state routing protocols in use today would have to be significantly improved in order to allow hosts to have multiple primary addresses (or characteristics) as the general case.
- multicasting In addition to unicasting, another common type of conventional network data transport is "multicasting," which allows sending data from a sender to a group of receivers through an internetwork using a single address for the group.
- all hosts and networks in addition to having their single primary address for unicasting, are also allowed to have multiple multicast addresses.
- the multicast protocol is described in a Ph.D. thesis by S. Deering in “Multicast Routing in a Datagram Internetwork” (Stanford Technical Report STAN-CS-92-1415, Dept. of Computer Science, Stanford University, December 1991). Multicast groups are considered “open” because anyone, whether they are a member of the group or not, can send data to a multicast group.
- This group is defined by a single address, and computer hosts can dynamically choose to join or leave a multicast group in order to begin or end the reception of the multicast transmission.
- the group members remain anonymous, and the senders often do not even know the size of the group. Therefore, a sender does not know if anyone is actually receiving the data that was transmitted (multicasting is similar to a radio station which broadcasts a radio program on a specific channel and people who wish to receive the broadcast can tune to the particular channel).
- Each host can be a member of multiple multicast groups and, therefore, can have multiple "names.” However, a host can only be addressed by one group or name at a time because the group addresses cannot be combined in any efficient way. Therefore, because of the anonymity of the receivers, multicasting can be inefficient because the routers do not know where to deliver the data.
- Dense-mode multicast is typified by the approaches initially taken in Deering's Ph.D. thesis and discussed in RFC 1585 (both mentioned above).
- Sparse-mode multicast is discussed by D.Estrin et al. in RFC 2362 entitled “Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification” (June 1998).
- the dense-mode multicast protocol solves the multicast receiver anonymity problem by broadcasting the first packet throughout the internetwork in order to reach everyone. Those hosts who do not want to receive the data stream have to opt out by sending a prune message back to the sender. The end result is that the routers have a shortest path tree from the sender to the receiver. However, because the initial broadcast has to be used in order to determine this tree, dense-mode multicast is not considered a network-friendly protocol.
- U.S. Patent No. 4,740,954 issued to Cotton et al. tried to improve upon the original design by designating a network-wide spanning tree through which the initial broadcast had to be channeled. However, this approach still requires an initial broadcast to be used.
- the sparse-mode multicast protocol uses a multicast group "coordinator" in order to solve the multiple receiver anonymity problem.
- the nearest router becomes the coordinator for this multicast group and immediately begins to inform all other routers that it is the coordinator for the group.
- Hosts that wish to receive the data streams for this multicast group must now opt in by specifically telling the coordinator that they wish to be a receiver.
- the coordinator creates a single tree for that multicast group, called a core-based tree, with itself as the root. Using a single tree allows the sparse- mode multicast protocol to be used on wide-area internetworks with a minimum of disruption.
- This system is an information radio broadcasting system that determines whether information broadcast by a general transmitter is relevant to a particular user based on the user's location, velocity, and/or time.
- One or more of the following would describe each message: a segment that includes a characteristic region, a velocity, a time corresponding to an event, an event specific tag.
- the selection criteria may also include arbitrary event specific tags.
- the receiver at the remote terminal receives the messages from the transmitter at the general broadcasting unit.
- the computer host evaluates the segment in the messages and determines if the segment sufficiently matches the stored selection criteria. If a match is found, then the host computer receives the message.
- this system does not provide multi- hop capabilities, since it assumes that all receivers are within range of the single transmitter.
- the system of Mardus which employs only a single transmitter, does not provide multi-hop routing capability or make efficient use of network bandwidth, and suffers the same bottleneck and point-of-failure problems as the system described by Ernst et al.
- the Mardus system simply transmits all of the information and lets the receivers filter out the information that belongs to them.
- Yet another system that allows computer hosts to use a geographic characteristic of a receiver to determine whether a particular user should receive a broadcast data transmission is described by J.C.Navas and T.Imielinksi in "Geographic Addressing and Routing" (Proceedings of the Third ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'97) in Budapest, Hungary, September 26-30 1997).
- This system performs routing of packets through an internetwork using only geographical criteria.
- a sending host would address a packet for a contiguous geographical region by specifying the destination as a bounding polygon whose points are defined using longitude and latitude. Only hosts within the geographic area would receive the transmitted message. While this system also uses a routing approach in order to transport messages to a set of receivers, it specifically only routes based on geographical criteria.
- DNS Domain Name System
- the first host when a first computer host wishes to converse with a second computer host with a particular name, the first host contacts all of the DNS domains until one of them returned a network address for the desired host name.
- the DNS system does not provide routing based on multiple characteristics of destination hosts.
- the present invention provides a system and methods that enable hosts in an internetwork to have multiple identifying descriptive names/characteristics and still be able to efficiently transport data/messages over multiple hops to multiple recipients using any arbitrary mix of these names/characteristics.
- the present invention also allows data to be delivered to hosts who either exactly match the arbitrary mix of names specified for destinations of the data or are only similar to the arbitrary mix of names specified.
- the present invention provides a method for routing a packet from over a network including multiple nodes.
- the method includes the step of receiving a packet from a sender node over the network, where this packet is intended for at least one destination node having a plurality of defined characteristics determinable by the sender node.
- the packet which includes information on the plurality of defined characteristics, is received by at least one destination node having the plurality of defined characteristics.
- the plurality of defined characteristics is a subset of or a total set of multiple, arbitrary characteristics describing aspects of multiple nodes in the network.
- the present invention provides a system for routing a packet over a network to at least one destination node having a predefined subset of a total set of multiple arbitrary characteristics.
- the system includes a plurality of nodes coupled to the network.
- the plurality of nodes includes at least one host node and at least one routing node.
- Each host node is capable of selecting the predefined subset of the total set of multiple arbitrary characteristics and then sending the packet destined for all host nodes having the predefined subset.
- the packet includes the predefined subset.
- Each routing node is capable of forwarding a copy of the packet based on a stored local characteristic routing table of a discovered local topology of the network.
- the routing table includes entries based on particular characteristics of each node locally coupled to the routing node.
- FIG. 1 illustrates sending a message using multicast to network nodes having the combination of names A, B, and C, where each name represents a multicast group, in accordance with a prior art multicast approach.
- FIG. 2 illustrates sending a message using characteristic routing to network nodes having the combination of characteristics A, B, and C, in accordance with a specific embodiment of the present invention.
- FIG. 3 generally illustrates a characteristic routing system, according to a preferred embodiment of the present invention.
- FIG. 4 is a generalized functional diagram of a characteristic routing node, according to a specific embodiment of the present invention.
- FIG. 5 illustrates sending a message using approximated characteristic routing to network nodes having the combination of characteristics A, B and C, and pruning excess routing tree branches, in accordance with a specific embodiment where an approximation of the set of total characteristics is used.
- FIG. 6 illustrates the network stack locations of various internetwork protocols according to the prior art.
- FIG. 7 illustrates the format of a characteristic packet's globally unique identifier, according to a specific embodiment.
- FIG. 8 shows the format of a characteristic destination (or list of characteristics) that includes two elements (characteristics) making up the characteristic destination of a charcast packet, in accordance with a specific embodiment.
- FIG. 9 shows an Option Type field set to the characteristic IP option, in accordance with a specific embodiment.
- FIG. 10 shows an IP header with a characteristic routing option extension, in accordance with the specific embodiment.
- FIG. 11 shows an example of a characteristic routing packet that uses a characteristic header immediately after the IP header, in accordance with another specific embodiment.
- FIG. 12 illustrates the network stack locations of characteristic extensions CharOSPF, CharRIP and CharBP to existing network topology configuration protocols, in accordance with various specific embodiments of the present invention.
- FIG. 13 illustrates the CharOSPF Options field according to a specific embodiment.
- FIG. 14 illustrates an example of a Characteristic- Area-LS A packet used in CharOSPF, in accordance with the specific embodiment.
- FIG. 15 shows as an example a CharRIP packet, in accordance with another specific embodiment.
- FIG. 16 shows as an example a CharBP packet, in accordance with the specific embodiment.
- FIG. 17 is an exemplary diagram illustrating pointer links between cache entries in a characteristic router's cache and the characteristic router's routing table entries, in accordance with a specific embodiment.
- FIG. 18 is an exemplary diagram demonstrating how a characteristic router's cache unintentional expiration can effectively de-link the downstream tree from the rest of the routing tree.
- FIGs. 19 and 20 are exemplary diagrams demonstrating how the present invention addresses the potential problem of a characteristic router's cache unintentional expiration, in accordance with a specific embodiment.
- FIG. 22 illustrates an encoding of a characteristic list 701 (this example shows an AND list having two list elements), in accordance with a specific embodiment for hierarchical characteristic routing.
- Characteristic Vectors Closed vs. Open Sets of Characteristics
- Characteristic routing is a new routing protocol which allows data to be transported multi-hop through an internetwork from a sender to a set of receivers using a description of the receivers in the form of multiple arbitrary identifying descriptive names.
- An identifying descriptive name is called a "characteristic" and can be any descriptive single word. For instance, a factory temperature sensor could have the characteristics "temperature” and "sensor.” Note that receivers can have multiple characteristics, and these characteristics can be acquired by a host or removed in a dynamic fashion.
- Examples of applications where characteristic routing can be used are in information management of distributed sensor networks, control of industrial automation networks, communication relating to logistics or the locations of objects, and other environments where messages are desired to be sent to nodes/objects having certain characteristics determinable by a sending node.
- Characteristic routing unlike unicasting which is optimized to make the single- address routing case fast, allows multiple names per computer host on the network and is optimized to make the multiple-address routing case fast.
- the characteristic routing system creates an efficient routing table index that, unlike the patricia tree, assumes that each destination will have multiple arbitrary and unstructured names.
- characteristic routing enables a sender to transmit data to multiple receivers at the same time.
- the sender can use an arbitrary mix of names/characteristics to address the set of receivers.
- characteristic routing the sender can choose whether the receivers need to exactly match the characteristic address (like unicasting) or whether they can be simply "similar" to the characteristic address.
- Characteristic routing according to the present invention differs from multicast in several respects.
- characteristic routing solves the anonymity problem by using a modified link-state routing protocol to preemptively gather information about the network topology and the names (or characteristics) of the hosts associated with it. When a packet is transmitted, this information is used in order to determine where the packet should go. Also, senders know immediately whether the data that they send will actually reach receivers, because the routers have sufficient information to inform them whether their data is deliverable or not. Second, the sender can use an arbitrary mix of characteristics in order to define the intended receivers for the message. Multicast, however, only allows one address per group and these addresses cannot be combined in any efficient way in order to reach some combination of multicast groups.
- characteristic routing is more network-friendly than dense-mode multicast, because only routers on the shortest path from the sender to the set of receivers are affected with characteristic routing.
- characteristic routing is more optimal than sparse-mode multicast, because every routing tree is a shortest-path routing tree rooted at the sender and not at some arbitrary "coordinator" router.
- FIGs. 1 and 2 illustrate the advantages of characteristic routing over multicast routing using a specific example where a sender node desires to send a message to all nodes having particular characteristics (e.g., characteristics A, B and C).
- FIG. 1 illustrates sending a message using multicast to network nodes having the combination of names A, B, and C, where each name represents a multicast group, in accordance with a prior art multicast approach.
- FIG. 2 illustrates sending a message using characteristic routing to network nodes having the combination of names A, B, and C, where each name represents a characteristic, in accordance with a specific embodiment of the present invention.
- FIGs. 1 illustrates sending a message using multicast to network nodes having the combination of names A, B, and C, where each name represents a characteristic, in accordance with a specific embodiment of the present invention.
- the network nodes shown are routing nodes that have host nodes (not shown) coupled thereto capable of having the names A, B, C, or a combination thereof, and the sender node is a routing node having a sender host node that sends the message.
- nodes 10 and 15 have all names A, B and C; nodes 25, 30, 35, 40, 45, 50, 55 and 60 do not have any of the names A, B or C; nodes 70 and 75 have only the name A; nodes 80 and 85 have only the name C; node 90 has only the names A and B; and node 95 has only the names B and C.
- each name would be a multicast group address. But since multicast by itself does not allow routing based on a combination of groups, a sender node 10 would have to split the message into three parts and multicast each part to a different multicast group. In this way, only the nodes 15 and 20 that are members of all three multicast groups (A, B and C) would receive the whole message desired to be sent by node 10. As will be explained further, the result using multicast is greater network disruption and many unintended receivers.
- sender node 10 sends a first multicast to all members belonging to the first multicast group A, a second multicast to all members belonging to the second multicast group B, and a third multicast to all members belonging to the third multicast group C.
- sender node 10 sends the first network message to node 35, which forwards a copy of the first network message to node 30, which then forwards a copy of the first network message to nodes 70 and 25.
- node 25 forwards a copy of the first network message to nodes 75 and 20, and node 20 forwards a copy of the first network message to node 90, which forwards a copy to node 15.
- the sender node 10 sends the second network message to node 65, which forwards a copy of the second network message to node 40, which then forwards a copy to node 45.
- Node 45 then sends a copy of the second network message to node 20, which forwards a copy of the second network message to nodes 90 and 95.
- Node 95 then forwards a copy of the second network message to node 15.
- the sender node 10 sends the third network message to node 65, which forwards a copy of the third network message to nodes 40 and 60.
- Nodes 40 and 60 forward copies of the third network message to node 45 and node 50, respectively.
- node 50 forwards a copy of the third network message to node 80
- node 45 forwards copies of the third network message to nodes 20 and 85.
- Node 85 further forwards a copy of the third network message to node 95, which forwards a copy on to node 15.
- the sender node 10 when using the characteristic routing system of the present invention, the sender node 10 simply specifies that the receiver nodes must have all three names A, B, and C in order to receive the message (a message sent using characteristic routing according to the present invention is referred to as a "characteristic message"). Characteristic routing would then transport the characteristic message by the shortest path from the sender to the receivers. Since the original exact set of names was used to determine the next hop at each router, the optimal routing tree from the sender to the receiver is created. In particular, as illustrated in FIG. 2, the sender node 10 sends a characteristic message (shown by solid line arrows) to node 65, which forwards a copy of the characteristic message to node 40, which forwards a copy to node 45.
- a characteristic message shown by solid line arrows
- Node 45 then forwards a copy of the characteristic message to node 20, which forwards a copy of the characteristic message to node 90, which then forwards a copy to node 15.
- the arrows in FIG. 2 denote the routing tree created using characteristic routing. Therefore, when a sender sends a characteristic message using the present invention to only those nodes having names A, B and C, only a minimal amount of nodes (routing nodes 65, 40, 45 and 90) necessary to the routing of the message to the desired nodes receive a copy of the characteristic message that is intended for nodes 10 and 15 having names A, B and C.
- This example illustrates that characteristic routing according to the present invention greatly minimizes the number of mistaken endpoint receiver nodes and network traffic congestion, compared to multicast routing.
- characteristic routing the system is designed to allow computer hosts to have multiple names (characteristics). Characteristic routing can be broadly and flexibly used since it can route a message based on arbitrary characteristics, with one of those characteristics being the location of the receiver, the type of receiver, or any number of qualities of the receiver. Furthermore, these names or characteristics can be acquired by a host or removed in a dynamic fashion with little overhead. With characteristic routing, as long as the receivers are within range of any transmitter, the characteristic messages will be forwarded from the sender to the receivers through possibly several intermediate routers until they reach their destinations.
- Characteristic routing efficiently uses the available network bandwidth by constructing a shortest-path routing tree from each sender to all of the receivers. In this manner, the information travels only by the most direct route and only to the intended receivers. Routers using characteristic routing according to the present invention are referred to as "characteristic routers.” Characteristic routers have sufficient information in their routing tables to know whether data with a specific address is deliverable before they transport the data. In addition, it is noted that the term "characteristic router” is used in a general sense and may include traditional routers, network switches, gateways, bridges, or controllers which bridge separate networks, as long as the characteristic routing capabilities are resident thereon. Further, characteristic routing may be used in a wired network, wireless network, or combined wireless-wired network.
- a characteristic router Using an augmented protocol for discovering the network topology and automatically configuring a routing table (various specific embodiments will be described further below), a characteristic router will have a routing table entry based on characteristics for each destination in the network. Each entry will then contain information on a destination's characteristics, IP address, the shortest number of intermediate routers between the current router and the destination, and the preferred neighbor router to use as the next step on the path to the destination.
- a characteristic router When forwarding an incoming packet, a characteristic router uses routing table information to determine where the final destinations for the characteristic message reside and which neighbor routers should be sent a copy of the packet. First, using the characteristic information contained in the routing table and the message header, all of the final destinations for the packet are discovered. Then a list of the neighbor routers on the direct shortest paths to the destinations is created and a copy of the message is sent to each neighbor router on the list. When a characteristic message has been forwarded all of the way from the sender to all of the receivers, the routers will have created a shortest- path routing tree with the "root" at the sender and the "leaves" at all of the receivers.
- the routing tree will be optimal (as seen in the example of FIG. 2). In order to ensure that shortest-path routing tree is created, the characteristic router will only forward packets that arrive from the sender by the shortest path. If not, then the router simply responds with a "prune" message to the packet's previous hop and drops the packet, in some embodiments as discussed below.
- the characteristic router keeps a cache of the next-hop destinations of the most recent characteristic message packets.
- a router When a router receives a characteristic message packet, it will use the incoming packet's sender IP address and set of destination characteristics together as a key into the cache. If this is not the first packet to arrive for this destination and if the timer on the cache entry has not yet expired, then the cache will return a list of all of the neighbor routers to which copies of the packet must be sent.
- FIG. 3 generally illustrates a characteristic routing system, according to a preferred embodiment.
- the characteristic routing system 100 includes three main components: characteristic routing host software ("CharHost software”), characteristic application programming interface (“CharAPI”), and characteristic routers ("CharRouters").
- CharacterHost software characteristic routing host software
- CharAPI characteristic application programming interface
- CharRouters characteristic routers
- a host When a host first boots, it declares to the local characteristic router the characteristics that describe the host. In this manner, the router can keep track of the various characteristics of the hosts on its networks. If the characteristic router needs to find out the characteristics of the hosts on its network (for example, when the router recovers from a crash), it broadcasts a Characteristic Address Resolution Protocol (CharARP) query. All of the hosts receive this broadcast and then respond with their characteristics. If the characteristic router needs to discover which node has a particular set of characteristics, it broadcasts a CharARP query and includes the specific characteristics of interest. Only those hosts with those characteristics will respond to this query.
- CharARP Characteristic Address Resolution Protocol
- system 100 includes a first CharRouter 105 coupled to a first characteristic host node 110, which includes CharHost software 120 and CharAPI 125.
- a second CharRouter 135 is coupled to first CharRouter 105 via an internetwork 130. Further, second CharRouter 135 is coupled to a second characteristic host node 140, which includes CharHost software 145 and CharAPI 150.
- the CharAPI is the set of software library routines that allow a programmer to create applications that can send and receive characteristic messages.
- the CharHost software is located on all computer hosts that are capable of receiving and sending characteristic messages. CharHost software is located in the Network Layer of the Internet protocol stack in the operating system of the computer. Its role is to notify all client processes about the availability of characteristic messages and to interface with the local CharRouter.
- the CharHost software also includes the client-side CharARP functionality described above.
- characteristic routers are in charge of forwarding a characteristic routing message from a sender to a receiver through an internetwork. Each characteristic router is charged with performing characteristic routing functions for those networks to which it is assigned. CharRouters keep track of the local characteristics by creating a union of the characteristics of the computer hosts attached to the networks assigned to the CharRouter. CharRouters build their routing tables by exchanging the characteristics of their local networks.
- the CharRouter also includes the server-side CharARP functionality described above.
- Routing involves two separate functions: control message exchange and packet forwarding.
- Control message exchange involves routers swapping routing table information and then having each router create a routing table from the network information that it accumulated.
- Packet forwarding involves each router using its routing table in order to decide the next hop for a packet that it receives.
- a link-state routing protocol Open Shortest Path First (OSPF) protocol is augmented (to create CharOSPF, in accordance with a specific preferred embodiment, as discussed below) so that when a characteristic router is sending its routing table information to a neighboring characteristic router, it includes the characteristics of all of the destinations listed in its exchange information.
- OSPF Open Shortest Path First
- other specific embodiments utilize augmented protocols besides CharOSPF.
- FIG. 4 is a generalized functional diagram of a characteristic routing node, according to a specific embodiment of the present invention.
- a characteristic node contains a characteristic routing functional component ("charcast” functionality) can allow it to act as a characteristic router (or “CharRouter”), in addition to acting as a conventional unicast and multicast router.
- a characteristic routing node such as CharRouter 105 in FIG. 3, can be functionally thought to include a unicast functional component 200, a multicast functional component 205, and a charcast functional component 210.
- the routing node is desired to only have limited functionality, such as only charcast functionality, the unicast and/or multicast functionalities may be omitted.
- the characteristic router node includes all three of these functionalities.
- the charcast functionality may be included with other types of routing functionalities (different from unicast or multicast).
- unicast and multicast functional components 200 and 205 are included with the charcast functional component 210 in node 105.
- unicast component 200 includes a unicast classifier 215 and a port demultiplexer 220.
- Unicast classifier 215 routes a packet using a unicast routing table.
- Port demultiplexer 220 using the destination port for the packet, sends the packet to the particular application currently using that particular destination port.
- Multicast component 205 includes a multicast switch 225, a multicast classifier 230, and a first replicator 240 and a second replicator 245. This example merely shows two replicators.
- Multicast switch 225 determines whether the packet should be routed using the unicast routing table or using the multicast routing table.
- Multicast classifier 230 routes a packet using the multicast routing table.
- a multicast replicator (240 or 245) actually transmits the packet to the outgoing links or to the internal port demultiplexer (if the packet is destined for an application on node 105).
- node 105 includes a charcast functional component 210, as mentioned above, that provides the capability for node 105 to perform characteristic routing. Logically coupled to characteristic routing node 105 are various applications and communication links.
- Node 105 includes a logical input port 250, where a packet is received by node 105, and a charcast switch 255 which determines whether the packet is a characteristic message packet.
- multicast switch 255 in node 105 has determined that a received packet is not a characteristic message packet, then the packet is routed to multicast functional component 205 for handling. More specifically, multicast switch 225 determines, based on the type of address from the packet's header, whether the packet should be routed using the unicast routing table or using the multicast routing table. If the packet has a multicast address, then multicast switch 225 sends the packet to multicast classifier 230, which routes the packet using the multicast routing table.
- Multicast classifier 230 then routes the packet to the appropriate multicast replicator (240 or 245) for transmission of the packet to the appropriate outgoing link(s) and/or node 105's application(s) (via port demultiplexer 220, if to an application). However, if the packet is determined by multicast switch 225 to have a unicast address, multicast switch 225 routes the packet to unicast classifier 215, which routes the packet using the unicast routing table. Unicast classifier 215 can route the packet to the appropriate outgoing link(s), or to internal port demultiplexer 220 for the appropriate application(s).
- charcast functional component 210 also includes a first-in-first-out (FIFO) buffer 260, a charcast classifier 265, and a memory 270.
- Memory 270 stores a characteristic routing table (both the data that constitutes the routing table and the functions that will search and maintain the table, cache, and index), as well as the unicast routing table indexed by, e.g., a patricia tree, and the multicast routing table (and associated index, if existing), when unicast and multicast functional components are included in node 105.
- the characteristic routing table in memory 270 is coupled to its own index 280 and a memory cache 275, in a specific embodiment.
- Charcast functional component 210 also includes char-replicators (285, 295) and a function 290 to drop the target (i.e., discard the packet). Similarly as for replicators discussed above, this example merely shows two char-replicators. However, an arbitrary number of char-replicators can be used, as a different char-replicator is created for each sender/characteristic routing subset pair. The operation of the various parts of charcast functional component 210 in CharRouter node 105 will be described in more detail below.
- charcast switch 255 After charcast switch 255 has inspected the packet's header and determined the presence of a characteristic destination, charcast switch 255 passes the packet to charcast classifier 265 to continue handling. (Otherwise, charcast switch 255 passes the packet to the multicast functional component 205 for handling, as already discussed above.)
- Charcast classifier 265 queries the characteristic routing table (stored in memory 270) in order to determine the proper destination and path for the packet, and manages the list of char-replicators (285, 295), which perform the actual physical forwarding of the packet. If another characteristic message packet arrives at node 105 during the time that the charcast classifier 265 is busy forwarding a previous packet, the new packet will be placed on FIFO queue 260. Once charcast classifier 275 has finished forwarding its previous packet, it will grab the next packet on the queue.
- charcast classifier 265 When charcast classifier 265 receives a characteristic message packet, it queries the characteristic routing table for the packet's next hop by passing the packet's destination characteristics to the table. The characteristic routing table responds to the query either by returning the identity of the appropriate char-replicator (285 or 295) that charcast classifier 265 needs to use in order to forward the packet, or by telling charcast classifier 265 that the packet cannot be forwarded.
- the characteristic routing table first consults the unicast routing table to ensure that the packet arrived at node 105 from the sender by the shortest path. If it has not, then the packet cannot be forwarded and will be dropped (as indicated by drop target function 290). The characteristic routing table then uses packet's set of destination characteristics to search the routing table cache 275. Cache 275 stores forwarding information based on a packet's sender address and destination characteristics. Both have to match in order for cache 275 to return a successful hit. If a packet from this sender and for this destination have been seen before, then cache 275 will return the identity of the proper char- replicator to use. Then that proper char-replicator transmits the packet to the appropriate outgoing link(s) or, if appropriate, to port demultiplexer 220 for a resident application(s).
- the characteristic routing table will search the routing table index 280 using the packet's destination characteristics. Index 280 will return a list of potential candidate destinations that have those characteristics. If no candidates are found by index 280, then the characteristic routing table will inform charcast classifier 265 that the packet cannot be forwarded. If candidates are found by index 280, the characteristic routing table will use its routing table entries to derive the set of next hops for the packet and it will encode this knowledge in a new char-replicator object. If the current node 105 qualifies as a destination, then one of the next hops encoded in the char-replicator will be a link to the current node's port demultiplexer 220. The characteristic routing table then installs the new char-replicator object in charcast classifier 265 and returns the identity of this new char-replicator to charcast classifier 265.
- a char-replicator also performs a secondary role of being the mechanism for the pruning of overly-large routing trees, in specific embodiments where a set of characteristics is approximated, as discussed above.
- each char-replicator also contains the address of the previous hop. If the number of next-hops declines to zero, the char-replicator will then transmit a prune message to the previous hop.
- the char-replicator object will continue to exist for a period of time past the last received packet and then it will be deleted. Each new packet that arrives will trigger a corresponding prune message to be transmitted to the previous hop.
- the characteristics for a particular destination node in a routing table are kept as a vector of characteristics.
- the characteristic router assigns each unique characteristic a location on a bit vector.
- the various characteristics can be arbitrary and can be dynamically added (or removed) in some embodiments.
- An example of a vector of arbitrary characteristics is shown in Table 1 below.
- each unique characteristic is assigned a location in a bit vector (e.g., the "DSP" characteristic is assigned to the fifth bit vector location, where the number of the bit vector location indicates a position starting from the most significant bit, in a specific embodiment).
- the number of the bit vector location can be a position starting from the least significant bit.
- a bit vector of a particular destination node that has the following characteristics (“ASIC,” “Atomic,” “Fast Fourier,” “Helium,” “Hydrogen,” and “Wavelet") would have a resulting bit vector of "1100010110000001 ".
- Encoding of each bit in the bit vector of characteristics can be implemented in various ways, such as discussed below.
- bit vectors are being used, vector operations can be performed on the characteristics. For instance, in order to discover whether characteristic packet's destination characteristics match exactly with a routing table entry, a logical "AND" can be performed. If the resulting vector is equal to the original packet's destination characteristic vector, then an exact match is found. If only some of the destination characteristics need to be found, then a logical "AND” can be performed and if the result is simply greater than zero then at least some of the characteristics matched. In those situations where a message is desired to reach those nodes with at least one of the subset of destination characteristics, a logical "OR” can be performed and if the result is simply greater than zero then at least one of the characteristics matched.
- vectors can be considered to be lines in n-space (where n is the number of characteristics), the angle between the vectors can be found. Vectors that have a small angle between them can be considered "similar," whereas those with large angles between them are not similar. In this manner, the sender node could even specify that a characteristic message be sent to those nodes having a particular characteristic bit vector that has a predefined degree of similarity based on the angular difference between the destination nodes' vectors and the desired bit vector of desired characteristics.
- a "range" of characteristics inclusive between a starting characteristic and an ending characteristic can be specified by defining a starting characteristic (a particular starting vector bit) and an ending characteristic (a particular ending vector bit) in order to send a characteristic message to those nodes meeting all the characteristics within the defined range of characteristics.
- the characteristic bit vector enables rapid processing with characteristic routing, which can operate with great speed as well as efficiency.
- Characteristic Vectors Closed vs. Open Sets of Characteristics
- the characteristics used can be dynamically changed (removed or added), which can be useful for sending messages in changing environments where characteristics of nodes can vary as different nodes are added to (or removed from) the network. If the set of characteristics is "closed” or static, then the set of characteristics throughout the network will not change and all routers will have the same set of characteristics and the same characteristic vectors. This allows the characteristic bit vector to be calculated by the sender and placed directly into the packet header.
- each characteristic router may be operating with a different set of characteristics. This occurs because of the delay caused when a new characteristic appears in a network and is propagated throughout the network to all of the routers. At any one point in time, each characteristic router may not have the full set of characteristics existing in the network as a whole. Therefore, since the sender may not have the full set, it cannot calculate a characteristic vector and must list all of the destination characteristics in the packet header. Each characteristic router will then translate the list of characteristics into a characteristic vector consistent with the characteristic set known to that router.
- the network is using an "open" set of characteristics, it is possible that the number of characteristics can become large enough to put a strain on the system or, at least, make the resulting packet headers too large. Therefore, approximations are useful in some specific embodiments in order to reduce the number of characteristics that the system uses for characteristic routing. For example, various compression techniques can be utilized to significantly reduce the characteristic count.
- compression techniques such as Lempel-Ziv or Bloom filters (as will be discussed in more detail later) (other compression techniques are possible in other specific embodiments)
- Lempel-Ziv or Bloom filters other compression techniques are possible in other specific embodiments
- obtain their space savings by creating a small set of substrings with which the whole original string can be recreated.
- the substrings and the instructions of how to use the substrings are then stored to recreate the original string.
- the substring can be used as an approximation of the original set of characteristics.
- the senders and the routers would use this approximation technique.
- the first packet in a stream of packets would still have to send the original list of destination characteristics so that the endpoints can determine if these packets are really meant for them or not.
- the characteristic routers in these embodiments have to do less comparison work, and therefore can route faster. Also, the routing tables would be significantly smaller.
- characteristic packets in these embodiments may be forwarded to nodes that shouldn't have received these packets in the first place and the resulting routing tree will contain extra erroneous branches that should be pruned.
- a characteristic router detects that no downstream routers are viable destinations for a message and that it itself is not a destination of the characteristic message, then it will send a "prune" message upstream toward the source of the characteristic message.
- a characteristic router receives a prune message for a specific characteristic message, it removes that downstream router from the routing cache entry (if any) for that characteristic message. If this causes the number of downstream routers to drop to zero, then the characteristic router will itself send a prune message upstream.
- FIG. 5 illustrates the process of pruning excess routing tree branches when an approximation of characteristics is used.
- FIG. 5 uses the same example network structure as described for FIG. 2.
- the network nodes shown are routing nodes that have host nodes (not shown) coupled thereto having the names A, B, C, or a combination thereof, and the sender node is a routing node having a sender host node that sends the message.
- sender node 10 sends a characteristic message that uses an approximation of the set of total characteristics.
- sender node 10 sends a characteristic message (indicated by solid line arrows and dotted line arrows) using an approximate set of characteristics (referred to as an "approximated characteristic message") in order to send a message to nodes having A, B and C characteristics.
- This approximated characteristic message is sent to a node 60, which forwards a copy of the approximated characteristic message to node 40, which then forwards a copy of the approximated characteristic message to nodes 25 and 45.
- node 25 forwards a copy of the approximated characteristic message to node 75
- node 45 forwards a copy of the approximated characteristic message to nodes 85 and 20.
- Node 85 forwards a copy of the approximated characteristic message to node 95
- node 20 forwards a copy of the approximated characteristic message to node 90 which then forwards a copy to node 15.
- the arrows denote the optimal routing tree (shown by solid line arrows, such as obtained when not using an approximation of the set of characteristics, as shown in FIG. 2) and extraneous branches (shown by dotted line arrows, obtained due to the use of the approximation) that need pruning, as will be described below.
- the characteristic routing protocol can reside in various network stack layers (e.g., data link layer 2, network layer 3, or transport layer 4 of the Open Systems Interconnect (OSI) protocol stack) according to various specific embodiments.
- the layer where the characteristic routing protocol resides influences and contributes to determining the interface and capabilities of the characteristic routing protocol.
- OSI Open Systems Interconnect
- FIG. 6 illustrates the network stack locations of various prior art internetwork protocols. As seen in FIG. 6, Asynchronous Transfer Mode (ATM), Integrated IS-IS, and Multi-Protocol Label Switching Architecture (MPLS) are examples of protocols operating in the Pseudo-Data Link layer.
- ATM Asynchronous Transfer Mode
- Integrated IS-IS Integrated IS-IS
- MPLS Multi-Protocol Label Switching Architecture
- ATM protocols include Local Area Network Emulation (LANE), Multi-Protocol Over ATM (MPOA), Multicast Address Resolution Server (MARS), and Next Hop Resolution Protocol (NHRP).
- SONET, Ethernet and Token Ring are examples of protocols operating in the Data Link layer.
- OSPFv2, UDP, TCP, Inter-Gateway Routing Protocol (IGRP), Internet Group Management Protocol (IGMP), Protocol Independent Multicast (PIM) protocol, and Core-Based Tree (CBT) multicast protocol are examples of protocols operating in the transport layer directly above IP.
- Multicast extensions to OSPF MOSPF
- Routing Information Protocol version 2 RIPv2
- Border Gateway Protocol Border Gateway Protocol
- DVMRP Distance Vector Multicast Routing Protocol
- a characteristically routed packet contains at a minimum a globally unique identifier and characteristic-specific flags, which are in the charcast packet header.
- the globally unique identifier corresponds to a unique set of characteristics for a particular destination node or nodes.
- FIG. 7 illustrates the format of a characteristic packet's globally unique identifier 301, according to a specific embodiment.
- identifier 301 can be an 8 byte field that includes the sender's IP address 303 (4 bytes), the sender's port number 305 (2 bytes), and a message series number 307 (2 bytes).
- the sender IP address 303 and port number 305 identify a specific process and socket within a specific host, and the series number 307 identifies the different destinations targeted from that socket. As mentioned earlier, characteristics are used by the network for locating destination nodes and creating the initial routing tree.
- Characteristic-specific flags defined include a CHARCAST_TRAILBLAZER_PACKET flag that indicates whether a charcast packet is a trailblazing packet (as discussed below), a CHAR-CAST ORIGINAL_CHARACTERISTICS_REQUEST flag that indicates whether a charcast packet is a CharARP query (as discussed above), and a CHARCAST_ORIG ⁇ NAL_CHARACTERISTICS flag that indicates whether a charcast packet is a CharARP query response.
- the characteristic-specific flag can be a 1 -byte field that can be set to indicate the different characteristic-specific flag types described above.
- every charcast packet includes the list of characteristics for the destination node, in addition to the unique identifier and characteristic-specific flags.
- a "trailblazing packet" includes the list of characteristics, according to some preferred embodiments.
- the original charcast packet that the sender transmitted and all subsequent packets are sent using the normal charcast header that only contains the unique identifier and flags but not the corresponding list of characteristics.
- the trailblazing packet has a CHARCAST_TRAILBLAZER_PACKET flag that is set.
- the trailblazer packet effectively creates the characteristic routing tree paths through the network, and sets in motion the chain of events resulting in an optimal routing tree for that characteristic destination and sender combination.
- the original characteristics ' are recorded as part of the characteristic forwarding cache entry created when the trailblazer packet arrives.
- destination nodes for a charcast packet are those nodes having the list of characteristics corresponding to that packet's global unique identifier associated with that list.
- the characteristic destination (or list of characteristics) is represented as a list of elements, which can be strings of arbitrary size composed of unsigned bytes, in some embodiments. In other embodiments, the list of elements could have other lists as individual elements embedded inside of it.
- FIG. 8 shows the format of a characteristic destination (or list of characteristics) that includes two elements (characteristics) making up the characteristic destination of a charcast packet.
- the characteristic list 311 includes fields in a particular predefined order: a list type field 313 (1 byte), an element number field 315 (1 byte), a list size field 317 (2 bytes), and two list elements 319 and 329.
- List type field 313 is set, for example, to a predetermined value such as 0x02 to indicate a list.
- Element number field 315 is set to the number of elements in the list (in this example, as element number field 315 is an 8- bit field, the list is limited to 256 total possible elements).
- List size field 317 indicates the total size in bytes of the entire encoded list including the list type field 313, the element number field 315, the list size field 317, and the elements 319 and 329 themselves (for example, in this example, the total list size would be 18 bytes).
- Each list element (319, 329 in this specific example) includes a 1-byte element type field (321, 331), a 1-byte size field (323, 333), and an element data field (325, 335). It is noted that the list elements contained in a list can be of different sizes.
- the element type field is set, for example, to another predetermined value such as 0x01 to indicate an element.
- the size field indicates the total size in bytes of the entire encoded element including the element type field, the size field and the element data field (in this example, the size field would indicate the value six for element 319 and the value eight for element 329).
- the element data field is the actual raw element data itself, and the size of the element data field is not a fixed size but rather will depend on the size of the element data (for example, as mentioned above, a particular element in an element list could have a list of elements embedded within that particular element).
- a characteristic destination can include an arbitrary number of elements for different charcast packets by having additional elements in the list.
- the first element of the list is assumed to be a command, in accordance to a specific embodiment.
- the following commands are recognized: AND - Destinations must match all of the elements in the list, where the list may contain an arbitrary number of elements; OR - Destinations must match at least one of the elements in the list, where the list may contain an arbitrary number of elements; Range - Destinations having all of the known characteristics that lie in the range between the first list element and the second list element, where the list must contain at least two elements after the range command; and Similar - Destinations must be similar to all of the elements in the list, where the list may contain an arbitrary number of elements and the first element after the command is the percentage of similarity (for example, 100% indicates an exact match and 0% indicates a complete opposite match).
- the AND command is implied if no command is given as the first element in the list.
- the different commands have corresponding values that are indicated in the element type field of the each element that identifies
- an example of a characteristic destination is: ( AND ASIC Wavelet (RANGE Helium Hydrogen) RAM (RANGE DSP Flash)), where the '(' and ')' denote the beginning and end of a list.
- a characteristic packet that has this particular exemplary characteristic destination is intended to be received by nodes that have all the characteristics of (a) an ASIC, (b) a Wavelet, (c) Helium and Hydrogen, (d) RAM, and (e) DSP and Fast Fourier and Flash.
- the specific embodiments with characteristic routing residing below IP can provide a standard set of functionalities to IP.
- embodiments with characteristic routing residing below IP in the data link layer can allow characteristic routing to take advantage of the features (e.g., speed or functionality) of the particular data link layer protocol used.
- a specific embodiment could interface with Ethernet hardware that is VIA capable and take advantage of the ability to asynchronously notify of the transmission or reception of data packets and its ability to employ direct memory access (DMA).
- DMA direct memory access
- data link layer protocols do not typically provide packet fragmentation and reassembly where the data packet is larger than the maximum transport unit (MTU)
- MTU maximum transport unit
- these embodiments would need to implement their own fragmentation and assembly.
- these embodiments would need to have new interface code for characteristic routing implemented for each of the different data link layer protocols.
- the characteristic routing protocol can be ideally implemented in the network layer.
- the characteristic routing protocol can be used as the network layer protocol in a specific embodiment.
- the characteristic routing protocol can be implemented in the network layer to co-exist with IP according to various specific embodiments.
- the characteristic routing protocol could be completely separate from IP and would require new data link encapsulations to distinguish it from the IP protocol IPv4.
- the characteristic routing protocol could be implemented as part of IP by existing as an option to the IP header and by adding fields for a set of characteristics and characteristic-routing-specific flags to a conventional network packet.
- this embodiment would advantageously allow packets routed using characteristic routing to take advantage of all the link layer protocols that IP runs over and allow transport layer protocols (such as User Datagram Protocol (UDP)) that run over IP to immediately take advantage of the added functionality provided by characteristic routing while keeping the amount of legacy applications re-coding to a minimum.
- transport layer protocols such as User Datagram Protocol (UDP)
- UDP User Datagram Protocol
- this embodiment may not operate optimally in those networks utilizing certain commonly-used routers that ignore header options in order to forward packets faster.
- the characteristic routing protocol could be implemented as part of the IP protocol family that is co-resident with IP as a different version number of IP.
- This embodiment has the benefit of running over all of the link encapsulations of IP while still being a separate protocol, similar to IPv5 (also known as the ST2+ protocol, described by L.Delgrossi and L.Berger in "Internet Stream Protocol Version 2 (ST2) Protocol Specification - Version ST2+", RFC 1819, August 1995).
- IPv5 also known as the ST2+ protocol, described by L.Delgrossi and L.Berger in "Internet Stream Protocol Version 2 (ST2) Protocol Specification - Version ST2+", RFC 1819, August 1995.
- ST2+ Internet Stream Protocol Version 2
- this type of embodiment may not operate in internetworks utilizing IPv4 implementations that do not check the version field in the packet headers and therefore become confused when receiving an IPv5 packet. Further, it may be difficult to obtain an IP Protocol Number officially, as these are drawn from an eight-bit range of numbers.
- each defined IP header option indicates a different type of IP option.
- currently defined IP header options exist for carrying authentication and group membership information (security option - class 0, number 2), for indicating routers the packet must pass through on the way to a destination (loose source routing - class 0, number 3), as well as other options not discussed herein.
- FIG. 9 shows a 1-byte option type field 341 that includes a copy flag 343, a class field 345 and a number field 347, in accordance with the specific embodiment.
- copy flag 343 for the characteristic IP option is set to 1, so that all fragments or copies of the packet will include the characteristic header option information.
- the characteristic IP option which defines the destination as a characteristic destination, has class flag 345 set to 0 because it controls how the packet is routed. Any unassigned IP header option number value, such as 10, may be used for number field 347 to define the new IP header option referred to as a characteristic IP option. Therefore, in a specific embodiment, the characteristic IP option has its copy flag set to 0, its class flag set to 0, and its number flag set to 10, resulting in a characteristic option code of 0x8 A.
- characteristic routing is indicated as a particular defined option to the IP header, as discussed above, and additional fields (for a version of characteristic routing, the globally unique identifier, a set of characteristics, and characteristic-routing-specific flags as discussed generally above) are added to the payload of a conventional IP network packet.
- Embodiments such as described in conjunction with FIG. 9 would advantageously allow packets routed using characteristic routing to take advantage of all the link layer protocols that IP runs over and allow transport layer protocols (such as UDP) that run over IP to immediately take advantage of the added functionality provided by characteristic routing while keeping the amount of legacy applications re-coding to a minimum.
- this embodiment may not operate optimally in those networks utilizing certain commonly used routers that ignore IP header options in order to forward packets faster.
- the packet header 351 seen in FIG. 10 illustrates an example of this specific embodiment of the invention with a characteristic routing option extension to a typical IP header.
- the packet header 351 includes a typical IP header 353, a characteristic option header 355, and a UDP header 357.
- UDP header 357 Following UDP header 357 is a data payload field 359 that contains packet data, and other fields (not shown) that conventionally follow the payload.
- the IP header followed by the characteristic routing option extension effectively makes the packet a UDP datagram with a characteristic destination.
- the protocol number field 361 in IP header 353 indicates the type of header that follows IP header 353.
- the UDP protocol number (17) would be used to indicate the presence of the UDP header 357 immediately following IP header 353.
- a predefined characteristic routing protocol number that is currently an unassigned IP protocol number (such as 254 in this example) can be used to indicate the presence of a characteristic option header 355 following IP header 353.
- a characteristic router upon receiving a packet with the protocol field 361 of IP header 353 set to the defined characteristic routing protocol number, passes the packet to characteristic routing-specific code within the router so that the packet is forwarded according to characteristic criteria and not IP criteria. Since characteristic routers may be spread throughout a network with only regular IP routers in between, each characteristic router will place the IP address of the next-hop characteristic router in the destination IP address field 363 of IP header 353.
- characteristic option header 355 includes an option code field 371, an option length field 373, a characteristic header version field 375, a characteristic-specific header flag field 377, and a globally unique identifier field 379.
- Option code field 371 is set to 0x8A, as discussed already in the context of FIG. 9.
- Option length field 373 is set to the value (in this example, 18) in bytes of the total length of characteristic option header 355 and the packet data (in this specific example, 6 bytes of data) in the data field 359.
- Characteristic header version field 375 is set to the particular version number of the characteristic routing protocol used (in this example, the version is 1).
- Characteristic-specific header flag field 377 can be set to predefined values indicating CHARCAST TRAILBLAZER PACKET, CHARCAST_ORIGINAL_CHARACTERISTICS_REQUEST, or CHARCAST_ORIGINAL_CHARACTERISTICS, as was discussed generally above.
- Globally unique identifier field 379 includes the sender IP address, port and series numbers, as already described generally above in conjunction with FIG. 7.
- FIG. 11 shows an example of a characteristic routing packet that uses a characteristic header immediately after the IP header.
- the packet header 401 includes a typical IP header 403 and a characteristic header 405.
- the protocol number field 407 in IP header 403 indicates the type of header that follows IP header 403.
- a predefined characteristic routing protocol number that is currently an unassigned IP protocol number (such as 254 in this example) can be used to indicate the presence of characteristic header 405 following IP header 403.
- a characteristic router upon receiving a packet with the protocol field 407 of IP header 403 set to the defined characteristic routing protocol number, passes the packet to characteristic routing-specific code within the router so that the packet is forwarded according to characteristic criteria and not IP criteria. Since characteristic routers may be spread throughout a network with only regular IP routers in between, each characteristic router will place the IP address of the next-hop characteristic router in the destination IP address field 409 of IP header 403.
- characteristic header 405 includes a characteristic header version field 411, a characteristic-specific header flag field 413, a characteristic header-and-data checksum field 415, a characteristic header- and-data length field 417, a globally unique identifier field 419, a destination port number field 421, and a sender port number field 423. Following characteristic header 405 is a data field 425.
- Characteristic header version field 411 is set to the particular version number of the characteristic routing protocol used (in this example, the version is 1). Characteristic-specific header flag field 413 can be set to predefined values indicating CHARCAST_TRAILBLAZER_PACKET, CHARCAST_ORIGINAL_CHARACTERISTICS_REQUEST, or CHARCAST_ORIGINAL_CHARACTERISTICS, as was discussed generally above. Characteristic routing header-and-data checksum field 415 contains the checksum value that verifies that the characteristic header and data have arrived without errors. Each router along the path from sender to the set of receivers needs to verify this checksum.
- Characteristic routing header-and-data length field 417 is set to the value (in this example, 22) in bytes of the total length of the characteristic header 405 and data (in this specific example, 4 bytes of data) in the data field 425.
- Globally unique identifier field 419 includes the sender IP address, port and series numbers, as already described generally above in conjunction with FIG. 7.
- Destination port number field 421 contains the IP port number to which the packet is being sent, and the sender port number field 423 contains the IP port number of the sender. If the application which sent the packet does not have a port number associated with it destination due to the sender's socket not having been bound to a particular Internet name space, then the value of the sender port number field 423 will be zero.
- CharBP is a characteristic routing protocol modification of DVMRP, in accordance with yet another specific embodiment.
- CharOSPF is a shortest path approach to routing
- CharRIP and CharBP are both distance vector approaches to routing.
- details of CharOSPF CharRIP and CharBP will be described below as representative specific embodiments.
- similar characteristic routing extensions to other existing network topology configuration protocols such as BGP, IGRP, PIM or CBT, are also possible.
- Another protocol described by J.J. Garcia-Luna-Aceves and S.Murthy in "A Path Finding Algorithm for Loop-Free Routing" (IEEE/ ACM Trans. Networking, February 1997) is a path finding approach to routing.
- the link-state shortest path approaches (like CharOSPF) require the most information
- the distance vector approaches (like CharRIP and CharBP) require the least information
- the path finding approaches require an amount of information between that required by the shortest path and distance vector approaches.
- the amount of information gathered before packet forwarding can commence in these extended protocols has a direct influence on the number of prune messages that subsequently have to be sent and processed in order to clean-up the routing tree that results from forwarding the first charcast message.
- CharOSPF has complete knowledge of network topology in its network database and is able to leverage this database to create prune-free routing trees.
- CharRIP has incomplete knowledge of the network and only knows the shortest number of hops to each destination, resulting in routing trees that need to be pruned.
- CharBP only uses a routing table to ensure that a packet arrives on the shortest path from the sender and uses a broadcast-and-prune to forward the packet.
- CharOSPF, CharRIP and CharBP each form source-based charcast routing trees, with CharOSPF and CharRIP broadcasting the characteristic reach information of all their networks, and CharBP employing a simple broadcast-and-prune approach.
- CharOSPF, CharRIP and CharBP are data-driven protocols so all routing decisions are made when the first data packet from a particular sender and for a particular characteristic destination is seen.
- CharOSPF, CharRIP and CharBP are used as examples of characteristic routing extensions to existing network topology configuration protocols, because they offer a contract in the amount of information that has to be gathered and stored in a routing database before packet forwarded can be performed.
- CharOSPF, CharRIP and CharBP and other specific embodiments with characteristic routing running over a transport layer protocol also are able to leverage additional services.
- embodiments running over UDP or TCP can use the optional checksum to validate the correctness of the received protocol packets.
- Embodiments running over UDP or TCP also can run in the user space without special privileges (in contrast, embodiments running directly over IP would have to use raw sockets requiring super-user permissions in order to use).
- CharOSPF running over a transport layer protocol, is a characteristic routing protocol extension of OSPFv2, in accordance with a specific embodiment.
- OSPF Open Shortest Path First protocol
- IGP Internal Gateway Protocol
- OSPF can be augmented in a specific embodiment by following the methodology described by J.T.Moy in OSPF: Anatomy of an Internet Routing Protocol (Addison Wesley Publishing Co., January 1998).
- OSPF is a dynamic link-state routing protocol that uses link state advertisements to pass information about network topology based on unicast and/or multicast routing.
- OSPF quickly detects changes in the status of connected subnets and then advertises those changes throughout the autonomous system by flooding it with link state advertisements.
- each router has the responsibility of advertising the status of the subnets to which it is directly attached and of forwarding the advertisements to other routers.
- each router maintains a database describing the topology of the entire autonomous system. Since this database describes all of the nodes and links within the autonomous system, it is called a link-state database. After all routers have flooded their incident subnet status, all routers will have the same link-state database.
- Each router then executes Dijkstra's shortest-path-first (SPF) algorithm on the link-state database in order to calculate a tree of loop-free shortest paths with itself as the root and every destination in the autonomous system as a leaf.
- SPF shortest-path-first
- each link is assigned a single dimensionless metric by the router that advertised it. If more than one equal-cost unicast path exists to a destination, then IP traffic is distributed equally among them.
- a router receives a flooded subnet status change, such as a link going down, it will rerun Dijkstra's algorithm and recalculate the shortest-paths tree.
- OSPF allows a two-level hierarchical routing scheme to be defined within an autonomous system in order to be able to build large networks. Contiguous subnets can be clustered together into groupings called areas. The boundary between two areas is the router that they have in common. This allows that each subnet to be entirely contained within a single area. Within an area, normal OSPF routing as described above occurs. However, addressing information is aggregated when advertised across area boundaries, and therefore the detailed topology information of the area is hidden from the rest of the autonomous system. Two advantages are derived from this information hiding. First, the size of the routing tables throughout the autonomous system is reduced. Second, topology changes within an area are also hidden from the rest of the autonomous system, and hence the routing traffic needed to maintain the routing tables is also minimized.
- new link state advertisements related to characteristic routing that reference pre-existing link state advertisements used for unicast and multicast routing can be used in addition to these preexisting link state advertisements, and the characteristics information can thus be added to existing unicast/multicast entries in the routing table.
- CharOSPF is a data-driven and source-based routing protocol that extends OSPF in two ways, in accordance with a specific embodiment.
- CharOSPF extends OSPF's hierarchical inter-area abstraction.
- the advertising router advertises a summary of the union of the characteristics of the subnets within the CharOSPF area. This characteristic summary of the CharOSPF area is then forwarded from area to area and advertised within the areas. Accordingly, individual routers within a CharOSPF area will know about the characteristic reach of the other areas and the appropriate border router to use when charcasting to the characteristic areas covered by those CharOSPF areas. CharOSPF thus takes advantage of the known hierarchical aspects of OSPF.
- CharOSPF enriches the network description contained in the link-state database by adding a new Link-State Advertisement (LSA), called the Characteristic- Area-LSA.
- LSA Link-State Advertisement
- the Characteristic- Area-LSA Used in addition to the other LSAs in OSPF, the Characteristic- Area-LSA describes the characteristic reach of a network attached to the router originating this Characteristic-Area-LSA, which augments rather than replaces the OSPF Router-LSA.
- the Characteristic-Area-LSA is flooded throughout the autonomous system in the same manner as other LSAs. Having only area flooding scope, Characteristic-Area-LSAs distribute characteristic network information throughout a single area only.
- the Characteristic-Area-LSA uses 9 as the LSA type number for identification.
- CharOSPF integrates a new Char-bit flag into the 8-bit OSPF Options field, which allows extensions to OSPF and backward-compatibility.
- the OSPF Options field with each extension to OSPF being allocated a bit within the field, allows routers to discover which other routers support a particular protocol extension within the autonomous system or area.
- the OSPF Options field is included in all OSPF Hello packets, OSPF Data Description packets and OSPF LSAs.
- FIG. 13 illustrates the CharOSPF Options field 431 according to a specific embodiment. By setting the Char-bit flag 433 in CharOSPF Options field 431 , routers are able to advertise to other routers that they are characteristically aware.
- CharOSPF Options field 431 can be set to indicate other protocol extensions, such as the demand circuit extension (DC-bit), TOS-based routing extension (T-bit), multicast routing extension (MC-bit), and others.
- DC-bit demand circuit extension
- T-bit TOS-based routing extension
- MC-bit multicast routing extension
- a router using an OSPF-derived protocol such as CharOSPF does not flood the LSA of a new extension (such as characteristic routing extension) to any neighboring routers unless a neighboring router also declares it supports that extension, and a router only stores and forwards the LSA extensions it understands.
- FIG. 14 illustrates an example of a Characteristic-Area-LSA packet 441 used in CharOSPF.
- Characteristic-Area-LSA packet 441 includes a LSA header 443 and a Characteristic Routing LSA extension 445.
- the Characteristic-Area-LSA augments the Router-LSA information (subnet's IP address, mask, and metric) by carrying the characteristic information for the subnet and by referring to the previously transmitted Router-LSA that described that subnet.
- LSA header 443 is the standard LSA header used in OSPF ⁇ vith the following exceptions: the options field 447 (as described generally in conjunction with FIG.
- Characteristic Routing LSA extension 445 includes a referenced LS (link state) type field 453 and the subnet's characteristics encoded as a single list 455 (as described generally above in conjunction with FIG. 8).
- the referenced LS type field 453 contains the link state type of the referenced link state ID in field 451 of LSA header 443.
- This link state type information is used to help in matching the correct link state ID in the case where more than one entry has the same link state ID.
- the characteristics list 455 includes two elements 457 and 459, but different numbers of elements may exist in a list in other examples.
- the example of FIG. 14 is a Characteristic-Area-LSA that refers to a previously flooded Router-LSA that described the subnet 128.6.5.0/24, so the link state ID is set to 128.6.5.0 and the referenced LS type field is set to 2 to indicate that it is a network type.
- CharRIP running over a transport layer protocol, is a characteristic routing protocol extension of RIPv2 that does not change RIP's specification but merely augments it, in accordance with a specific embodiment.
- RIPv2 (such as described by G.Malkin in RFC 2453 entitled “RIP Version 2" (November 1998)) is an Internal Gateway Protocol (IGP) meant for routing IP packets among the routers and networks within an autonomous system.
- IGP Internal Gateway Protocol
- RIP is restricted for use in an autonomous system that is, at most, of moderate size and is not optimal for use in a large-scale autonomous system.
- RIP is a dynamic Distance Vector protocol based on the Bellman-Ford algorithm (also known as the Ford and Fulkerson algorithm) derived from Bellman's equation.
- routers When using RIP, routers build-up their knowledge of the network by exchanging their routing table information with their neighbors.
- the routing table information consists of a list of all of the known destinations, a metric in the form of the number of router hops that a packet must travel to reach a particular destination, and the neighbor router that is the next hop on the path to that destination.
- Routers periodically exchange their routing table information by first incrementing by one the metrics of all of the destinations and then advertising the entire table by broadcasting it. Routers can also explicitly request from each other the routing table entries for specific destinations.
- a router receives a routing table advertisement from a neighbor router, it will compare the metric contained in the advertisement for each destination against the metric contained in its routing table. If the advertised metric is less, then the router will insert the metric for that destination in its routing table and change the next-hop router for that destination to be the router who sent the advertisement.
- Parts of the network can become inaccessible due to a problem in the first version of RIP (RIPvl) called “counting to infinity.” This is caused by routing loops occurring when links fail.
- Two methods were introduced in the second version of RIP (RIPv2) to combat this problem: split horizon with poisoned reverse and triggered updates. Split horizon with poisoned reverse will prevent any routing loops that involve only two routers by requiring a router A change its routing table advertisements to a neighbor router B by setting to infinity the metrics of the routes that were learned from B.
- triggered updates attempt to speed-up the convergence of the loop by requiring that routers immediately send update messages when a metric for a route changes.
- CharRIP does not change the current RIP protocol specifications but rather augments it similarly to the way that authentication was added to RIP.
- CharRIP spreads characteristic routing table information around the network by adding a Characteristic Information Route Entry to the list of possible route entries.
- a Characteristic Information Route Entry is identified by using a predefined hex value (such as OxFFFE) in the Address Family field of a conventional RIP route entry.
- Table 2 shows a list of the possible Address Family field values for CharRIP, according to this specific embodiment.
- a Characteristic Information Route Entry uses the space of an entire conventional RIP route entry, because RIP does not indicate the number of route entries in a routing table update.
- a router that receives a routing table update calculates the number of route entries by dividing the size of the update by the size of a route entry.
- CharRIP Address Family Identifiers A RIPvl or RIPv2 router would ignore the Characteristic Information Route Entry value in the Address Family field, because it would not be identified as either an IP address family route entry or as an authentication route entry.
- CharRIP routing table updates are marked as RIP version three (RIPv3) due to the manner in which RIPvl and RIPv2 handle routing table update messages of higher versions.
- a RIPvl or RIPv2 router discards all messages of version zero, discards messages of version one if any Must Be Zero (MBZ) field is non-zero, and does not discard messages of any version greater than one simply because an MBZ filed contains a non-zero value.
- MZ Must Be Zero
- CharRIP can be completely backward compatible with previous RIP versions, as long as the previous RIP versions maintain this behavior. If a CharRIP router receives a RIPvl or a RIPv2 routing table entry request, that router responds with a routing table advertisement of the appropriate version.
- a Characteristic Information Route Entry does not hold all the information about a particular destination. Rather, the Characteristic Information Route Entry augments the information about a particular destination that was previously advertised.
- a CharRIP routing table advertisement packet or response packet contains at least three distinct parts: the standard RIP header with the version number set to three, indicating that the packet contains a CharRIP packet; a normal RIPv2 route entry for a particular destination; and the Characteristic Information Route Entries that contain the characteristics of the particular destination described by that normal RIPv2 route entry.
- a first Characteristic Information Route Entry in a CharRIP packet would include the characteristic address family identifier (as per Table 2), the referenced IP address, and the first part of the encoded list of characteristics. All subsequent Characteristic Information Route Entries in the same CharRIP packet would contain the characteristic address family identifier and the subsequent section of the encoded list of characteristics.
- FIG. 15 shows as an example a CharRIP packet 461.
- CharRIP packet 461 includes a RIP header 463, a normal RIPv2 Route Entry 465, and a Characteristic Information Route Entry 467. More specifically, FIG. 15 shows a CharRIP Response packet to a neighbor router's previous request for the routing table entry for IP address 128.6.5.0. Because it is a response packet, the command field 469 of RIP header 463 is set to two (indicating a response message). The version field 471 of RIP header 463 is set to three, indicating that this is a CharRIP packet.
- the RIPv2 part 465 of the packet 461 contains the normal route entry information for this destination.
- the Characteristic Information Route Entry 467 that follows it includes an address field 473, a reference IP address field 475, and a list 477 of characteristics. As discussed above, address field 473 is set to OxFFFE to identify that characteristic information is contained. Reference IP address field 475 includes the same IP address in IP address field 483 of the RIPv2 route entry 465 referenced. The route tag field 485 of RIPv2 route entry 465 is set to zero to indicate that this is an internal route. In this example, the list 477 of characteristics in characteristic information route entry 467 includes two characteristics, encoded as elements 479 and 481. Of course, a different number of characteristics may be in the list in other examples.
- CharBP is a characteristic routing protocol modification of DVMRP (such as described by Waitzman, D.C. Partridge, and S.Deering in "Distance Vector Multicast Routing Protocol" RFC 1075, November 1988).
- CharBP is a broadcast-and-prune protocol that utilizes distance vector technology to spread knowledge of the shortest distance in router hops to all of the potential packet sources. In this manner, CharBP is similar to a reverse-RIP in the way that it operates.
- Each CharBP router periodically broadcasts to its neighbors the list of known sources and the router's distance (in router hops) to each source.
- Each CharBP router determines the previous hop for the path to each source by choosing the neighbor router that advertises the shortest distance from the source.
- CharBP has the same convergence problems that RIP and other distance vector protocols have and attempts to ameliorate them by using the methods of split horizon with poison reverse and hold down.
- FIG. 16 shows as an example a CharBP packet 501.
- CharBP is encapsulated by IGMP and CharBP packet 501 includes an IGMP header 503 and a CharBP header 505.
- IGMP header 503 includes a type field 507 and a subtype field 509.
- CharBP packets are encoded as a predefined IGMP type that is currently unassigned. For example, a CharBP packet could use IGMP Type 0x20 in type field 507.
- Subtype field 509 indicates the CharBP packet type (e.g., a CharBP probe packet that probes for CharBP routers, a CharBP route report packet that requests a route report, a CharBP response packet that is a response to a probe or route report packet, or a CharBP prune packet that indicates a prune should be performed). More specifically, FIG. 16 shows a CharBP Response packet to a neighbor router's previous request for the source table entry for IP address 128.6.5.0. Because it is a response packet, subtype field 509 of IGMP header 503 is set to one (indicating a response message). Since CharBP is a modified version of DVMRP, CharBP uses a subset of the DVMRP routing control message commands.
- CharBP is a modified version of DVMRP
- CharBP header 505 includes the information needed to define a route: the metric (a metric command field 513 and a metric value field 515), the infinity value (an infinity command field 517 and an infinity value field 519), the flags (a flags command field 521 and a flags value field 523), the subnet mask (a subnet mask command field 525, count field 527 and subnet mask value field 529), and the source address (a source address command field 531 , count field 533 and source address value field 535).
- Version field 471 of RIP header 463 is set to three, indicating that this is a CharRIP packet.
- the RIPv2 part 465 of the packet 461 contains the normal route entry information for this destination.
- the Characteristic Information Route Entry 467 that follows it includes an address field 473, a reference IP address field 475, and a list 477 of characteristics. As discussed above, address field 473 is set to OxFFFE to identify that characteristic information is contained. Reference IP address field 475 includes the same IP address in IP address field 483 of the RIPv2 route entry 465 referenced. The route tag field 485 of RIPv2 route entry 465 is set to zero to indicate that this is an internal route.
- the list 477 of characteristics in characteristic information route entry 467 includes two characteristics, encoded as elements 479 and 481. Of course, a different number of characteristics may be in the list in other examples. Number Command Name Description
- Subnet Mask Specifies the subnet mask(s) to use for all successive destination addresses.
- Infinity Specifies the value of infinity to use for the router hop count.
- Source Address Specifies a list of one or more IP addresses for source subnets.
- a characteristic router Using an augmented protocol such as CharOSPF, CharRIP or CharBP for discovering the network topology and automatically configuring a routing table, a characteristic router thus will have a routing table entry based on characteristics for each destination in the network.
- CharOSPF CharRIP
- CharBP CharBP
- the characteristic router keeps a cache of the next-hop destinations of the most recent characteristic message packets. There is a separate cache entry for each ⁇ sender address, destination characteristics> combination. Typically, the first packet for a ⁇ sender address, destination characteristics> combination that a CharRouter sees is the trailblazing packet, which then causes a cache entry to be created and populated.
- a characteristic router receives a characteristic message packet, it will use the incoming packet's sender IP address and destination characteristics together as a key into the cache. If this is not the first packet to arrive for this destination and if the timer on the cache entry has not yet expired, then the cache will return a list of all of the neighbor routers to which copies of the packet must be sent.
- each forwarding cache entry for a ⁇ sender address, destination characteristics> combination that is kept by a characteristic router contains an EXACT_CHARACTERISTIC_FLAG indicating whether the cache item contains the original characteristics of the destination, and a copy of the characteristic message's original destination characteristics. The copy of the original destination characteristics is taken from the first trailblazing packet that created the routing tree and cache entries in the routers along the routing tree paths.
- Each cache entry also includes information about the upstream router for this characteristic message and about the sender of the characteristic message. In particular, the cache entry includes the IP addresses of the upstream router and of the sender.
- the cache entry also includes a RECALCULATE ENTRYJFLAG indicating whether the cache entry should be deleted and recalculated when the next characteristic packet bound for the same ⁇ sender address, destination characteristics> combination arrives.
- Each cache entry includes a time stamp indicating when the cache entry was last updated or refreshed. A cache entry is refreshed every time another packet with the same ⁇ sender address, destination characteristics> combination is forwarded through the characteristic router.
- Each cache entry also has a list of the next-hop downstream characteristic routers that should receive a copy of all characteristic packets having the same ⁇ sender address, destination characteristics> combination.
- Each cache entry can have an ORIGINATING_HOST_FLAG set if that cache entry is located on the sending host.
- each cache entry additionally includes a list of pointers to each of the routing table entries that describe the set of destinations for this cache entry's characteristic destination.
- FIG. 17 is an exemplary diagram illustrating pointer links between cache entries in a characteristic router's forwarding cache and the entries in the characteristic router's routing table, in accordance with a specific embodiment.
- the characteristic router includes cache 551 and routing table 553.
- cache 551 there are multiple unique characteristic message cache entries (one entry for each ⁇ sender address, destination characteristics> combination, with abbreviation ⁇ S G> where S indicates sender and G indicates a characteristic destination).
- cache 551 includes a cache entry 555 for the ⁇ S7, Gl> combination, a cache entry 557 for the ⁇ SJ G2> combination, and cache entry 559 for the ⁇ S2, G3> combination.
- Routing table 553 includes multiple networking node routing table entries.
- routing table 553 includes a routing table entry 561 for node 1, a routing table entry 563 for node 2, a routing table entry 565 for node 3, and a routing table entry 567 for node 4.
- Each cache entry has a list of pointers (indicated by solid line arrows) to each of the routing table entries that describe the set of destinations for that cache entry's destination characteristics; conversely, each routing table entry has a list of pointers (indicated by dotted-dash line arrows) to the cache entries that refer to that routing table entry.
- pointers indicated by solid line arrows
- cache entry 555 has a pointer to routing table entry 561, because node 1 is the only member of the set of destinations for the characteristic message ⁇ S7, Gl>; cache entry 557 has pointers to routing table entries 561 and 567, because both nodes 1 and 4 are part of the set of destinations for the characteristic message ⁇ Si, G2>; and cache entry 559 has a pointer to routing table entry 563, because node 2 is the only member of the set of destinations for the characteristic message ⁇ S2, G3>.
- routing table entry 561 has pointers to cache entry 555 and 557 for characteristic messages ⁇ S1, Gl> and ⁇ Si, G2> because both of these cache entries include node 1 in their set of destinations and refer to node 1 ; routing table entry 563 has a pointer to cache entry 559 for characteristic messages ⁇ S2, G3> because this cache entry includes node 2 in its set of destinations and refers to node 2; routing table entry 565 has no pointers any cache entries because none of the cache entries includes node 3 in their set of destinations; and routing table entry 567 has a pointer to cache entry 557 for characteristic messages ⁇ S7, G2> because this cache entry includes node 4 in its set of destinations and refers to node 4.
- Each characteristic router maintains its forwarding cache.
- the first packet for a ⁇ sender, destination characteristics> combination that a characteristic router sees is the trailblazing packet, which causes a cache entry to be created and populated.
- Cache entries are soft state and remain in existence as long as they are refreshed periodically. Every time a new packet for a ⁇ sender, destination characteristics> combination arrives at the characteristic router, the cache entry for that combination is referenced and its timestamp updated. If no new packets are seen for a predetermined time period (for example, 30 seconds), then that cache entry's information is considered stale and is deleted. If the cache entry is still in existence and a new trailblazing packet arrives for that ⁇ sender, destination characteristics> combination, then the original cache entry is deleted and a new cache entry is created and populated.
- a predetermined time period for example, 30 seconds
- the characteristic router's forwarding cache On the arrival at a characteristic router of a characteristic routing protocol control message announcing a change in the network topology that affects a specific subset of the destinations listed in the routing table, the characteristic router's forwarding cache also needs to be updated.
- the characteristic router Since the characteristic router does not know which of the cache entries are simply waiting to time out and which are being actively used, the characteristic router simply marks all of the affected cache entries by setting their RECALCULATE_ENTRY_FLAG. The affected cache entries are found by following the pointers to them from the routing table entries whose information is changed by the incoming routing protocol control message. By setting the cache entry's RECALCULATE_ENTRY_FLAG, the characteristic router indicates that the cache information needs to be rebuilt when the next packet for that ⁇ sender, destination characteristics> combination arrives. If no such packet arrives, then the cache entry will time out as normal and be deleted.
- a new packet does arrive, however, then not only does it trigger a recalculation of the routing cache entry information, but it also causes the characteristic router to issue a new trailblazing packet for that ⁇ sender, destination characteristics> combination. In this manner, the stored original characteristic destination's characteristics information can be used for the new trailblazing packet.
- the new trailblazing packet forces all downstream routers also to recalculate their cache entries, even though they may not have received yet any routing protocol control message indicating the network topology change. After the new trailblazing packet is sent, then the characteristic packet is sent immediately after it. This scheme, according to a specific embodiment, effectively spreads out the recalculations of the cache entries over time and perturbs the characteristic router less.
- FIG. 18 is an exemplary diagram demonstrating how a characteristic router's cache unintentional expiration can effectively de-link the downstream tree from the rest of the routing tree.
- FIG. 18 shows an internetwork of characteristic routers (identified as reference odd numbers 601-621) with a routing tree that would have been built or that was previously built by a trailblazing packet (for destination characteristics met by characteristic routers 607, 609 and 611) originally sent from characteristic router 601.
- This routing tree (indicated by arrows) includes routers 601, 603, 605, 607 with leaves to routers 609 and 611. If the first trailblazing packet never arrived at characteristic router 603 or a cache entry times out just before another characteristic packet arrives at characteristic router 603, then the downstream routing tree is de-linked (as indicated by the "X") from the rest of the routing tree. In both cases, a non-trailblazing characteristic packet with only the globally unique identifier arrives at characteristic router 603.
- FIGs. 19 and 20 are exemplary diagrams demonstrating how the present invention addresses the potential problem of a characteristic router's cache unintentional expiration.
- FIGs. 19 and 20 show the same internetwork of characteristic routers (identified as reference odd numbers 601-621) as in FIG. 18, and also deals with the same routing tree as discussed in FIG. 18. As seen in FIG. 19, a non-trailblazing characteristic packet (indicated by arrow 631) with only the globally unique identifier arrives at characteristic router 603.
- a characteristic router In response to receiving a non-trailblazing characteristic packet with only the globally unique identifier, a characteristic router according to a specific embodiment of the invention sends upstream a message with the CHARCAST_ORIGINAL_CHARACTERISTICS_REQUEST flag set. Therefore, characteristic router 603 would send such a message upstream (indicated by arrow 633) to characteristic router 601 that acts as a request to the upstream characteristic router 601, which does have the original characteristics information, to send that characteristics information downstream in a trailblazing packet with the
- characteristic router 601 responds by sending the trailblazing packet (indicated by arrow 635) with the CHARCHAST_ORIGINAL_CHARACTERISTICS flag set to characteristics router 603.
- a new cache entry is created in the forwarding cache of characteristic router 603, and the trailblazing packet is forwarded downstream in order to create the downstream routing subtree (formed by arrows from characteristic routers 603 to 605 to 607 to both 609 and 611) and thus form the desired routing tree (indicated in FIG. 20 by all the arrows with the exception of arrow 635).
- characteristic routers use augmented protocols such as CharOSPF, CharRIP or CharBP to discover the network topology and automatically configure a routing table based on characteristics for each destination in the network.
- characteristic routers also create forwarding cache entries using the characteristic routing table index to determine the set of destinations for the characteristic packet.
- cache entries are created when a characteristic router first sees a characteristic packet (such as a trailblazing packet) for a particular ⁇ sender, destination characteristics> combination.
- the creation of cache entries by characteristic routers in accordance with specific embodiments using CharOSPF, CharRIP and CharBP may vary slightly, as discussed below.
- a characteristic router upon arrival of the first characteristic packet for a particular ⁇ sender, destination characteristics> combination, a characteristic router performs a SPF calculation in order to determine the shortest-path routing tree through the network for this ⁇ sender, destination characteristics> combination.
- SPF calculation only CharOSPF routers are taken into account and pre-set tiebreakers are used so that all routers will create exactly the same routing tree.
- This routing tree is rooted at the sender and has the set of destinations as the leaves. From this routing tree, the characteristic router extracts the set of next-hop neighboring routers to which a copy of the characteristic packet will be sent.
- the routing tree might contain cross-branches that simply incur control message overhead because they need to be pruned. However, these cross-branches can be removed and their pruning eliminated by performing the SPF calculation in accordance with this specific preferred embodiment using CharOSPF, resulting in an optimal routing tree.
- a characteristic router uses the characteristic routing table index to determine the set of destinations for the characteristic packet. From this set of destinations, the characteristic router determines the set of next- hop neighboring routers to which a copy of the characteristic packet will be sent. It is noted that this embodiment may result in cross-branches that need to be pruned.
- a characteristic router Using CharBP, a broadcast-and-prune protocol, a characteristic router periodically broadcasts to its neighbors the list of known sources and the router's distance (in router hops) to each source. Initially, a routing tree that includes all of the subnets in the network is created. Upon arrival of the first characteristic packet for a particular ⁇ sender, destination characteristics> combination, this first packet is broadcast on this initial routing tree to all subnets. In order to avoid forwarding loops from occurring, the characteristic packet will be forwarded by the characteristic router if the packet arrived from the neighboring router on the shortest path back to the source. The characteristic router uses its stored knowledge of the shortest source distances in order to make this forwarding determination.
- That characteristic router node When one of the characteristic packet copies reaches a leaf routing node, that characteristic router node will determine if the destination characteristics area of the characteristic packet intersects the characteristics areas of its incident networks. If it does not, then the characteristic router node responds to its upstream neighboring characteristic router that the characteristic router node should be pruned from the routing tree node. If this upstream neighboring characteristic router does not have incident networks that intersect the packet's destination characteristics and if all of its downstream neighboring characteristic routers indicate that they also do not by sending prune messages, then this upstream characteristic router also sends a prune message to its upstream neighboring characteristic router. In this specific embodiment, this would occur repeatedly until the initial routing tree has been pruned back to the optimal routing tree that only includes paths to those subnets whose characteristic reach intersects with the characteristic packet's destination characteristics.
- hierarchical characteristic routing techniques can be used. Such specific embodiments are described below in more detail.
- each area In order to reduce routing table sizes, collections of contiguous networks and hosts can be grouped together into a single whole. Such a group, together with the routers having interfaces to any one of the included networks, is called an area. Each area internally runs a separate copy of the basic characteristic routing algorithm. Externally, each area appears to be a single node on the network. Note that hierarchies can consist of multiple levels.
- the topology of an area is invisible from the outside of the area, a summary of all of the characteristics of all the networks within the area is advertised for the area.
- routers internal to a given area know nothing of the detailed topology external to the area, they in turn have summaries of external areas.
- this isolation of knowledge enables the characteristic routing protocol to effect a marked reduction in routing traffic as compared to treating the entire network as a single routing domain.
- the area border routers inject additional characteristic routing information into the area.
- Each border router summarizes the list of characteristics of its attached areas for transmission to other area border routers.
- each network characteristic destination is stored as a Bloom filter, as will be discussed in more detail below.
- the bit vector resulting from the logical OR operation is a Bloom filter that will correctly identify all of the characteristics within the area. This new summary Bloom filter is what is advertised to other border routers.
- a border router then has the area summaries from each of the other border routers. From this information, the border router calculates paths to all inter-area destinations. The router then advertises these paths into its attached areas. This enables the area's internal routers to pick the best exit border router when forwarding traffic to inter-area destinations. If the hierarchy consists of multiple levels, each level is treated in the exact same manner.
- the substring can be used as an approximation of the original set of characteristics.
- the senders and the routers would use this approximation technique.
- the first packet in a stream of packets would still have to send the original list of destination characteristics so that the endpoints can determine if these packets are really meant for them or not.
- the characteristic routers in these embodiments have to do less comparison work, and therefore can route faster. Also, the routing tables would be significantly smaller.
- characteristic packets in these embodiments may be forwarded to nodes that shouldn't have received these packets in the first place and the resulting routing tree will contain extra erroneous branches that should be pruned.
- a characteristic router detects that no downstream routers are viable destinations for a message and that it itself is not a destination of the characteristic message, then it will send a "prune" message upstream toward the source of the characteristic message.
- a characteristic router receives a prune message for a specific characteristic message, it removes that downstream router from the routing cache entry (if any) for that characteristic message. If this causes the number of downstream routers to drop to zero, then the characteristic router will itself send a prune message upstream.
- each network characteristic destination is stored as a Bloom filter.
- This embodiment provides a computationally efficient, hash-based probabilistic scheme that can represent a set of keys in the form of arbitrary strings with minimal memory requirements, while answering membership queries with zero probability for false negatives and low probability for false positives.
- Bloom filters The idea behind Bloom filters is to allocate a vector v of m bits, initially all set to 0, and then choose & independent hash functions, h ⁇ , h 2 ,...,h k , each with range ⁇ l,..., m).
- the bits at positions h (a), h 2 (a),..., h k (a) in v are set to 1. (A particular bit might be set to 1 multiple times.)
- the bits at positions h ⁇ (b),h 2 (b),...,h k (b) ar checked. If any of them is 0, then certainly b is not in the set .4.
- b is conjectured to be in the set, although there is a certain probability that this conjecture is incorrect (called a "false positive").
- the parameters k and m should be chosen such that the probability of a false positive (and hence a false hit) is acceptable.
- the salient feature of Bloom filters is that there is a clear tradeoff between m and the probability of a false positive.
- the probability of a false positive reduces exponentially as m increases.
- k must be an integer, and a value less than optimal may be chosen to reduce computational overhead.
- each network characteristic destination is stored as a Bloom filter.
- k 4 and each characteristic is represented by its four hash function results, as shown in FIG. 21.
- Each characteristic would be encoded as four 32-bit integers, each hash function result being a 32-bit integer in this specific example.
- the characteristic destination would be in the form of a list of characteristics. Because of the nature of Bloom filters, operations such as “RANGE” and “SIMILAR” (discussed previously) will not work for these specific embodiments using Bloom filters. As such, only the commands "AND” and "OR” may be used in these embodiments. Note that if no operation is given in a characteristic message, then the AND command is implied. Usage profiles also indicate that the majority of destinations make use of simple lists of characteristics that are then AND-ed or OR-ed together. Therefore, simplified AND and OR lists can be used.
- FIG. 22 illustrates an encoding of a characteristic list 701 (this example shows an AND list having two list elements), in accordance with a specific embodiment for hierarchical characteristic routing.
- each simple list encoding has the following information in this order: a Type field 703, an Element Number field 705, a Size field 707, and the encoded list elements 709 and 711.
- Type field 703 is a l.-byte field that is set to 0x04 to indicate an AND list or could be set to 0x08 to indicate an OR list;
- Element Number field 705 is a 1-byte field that is set to the number of elements in this list (since this field 705 is an 8-bit field, the list is limited to 256 elements; but a different bit sized field 705 could have other element limits as desired);
- Size field 707 is a 2-byte field that indicates the size of the list in bytes (the size includes the overall size of the list including the Type field 703, Element Number field 705, the Size field 707, and the elements 707 and 711 themselves); and the encoding of each list element.
- the overall size in this example is limited to 64 kilobytes but other limits to the size are possible in other examples.
- each list element is an encoded characteristic, and each characteristic is encoded by its four hash function results, according to this specific embodiment.
- each router Since each router maintains a local Bloom filter to represent its total list of characteristics, changes to the set of characteristics (lets call it set A) must be supported. According to the specific embodiment, this is done by maintaining for each location £ in the bit array a count c( ) of the number of times that the bit has been set to 1 (that is, the number of elements that hashed to £ under any of the hash functions). All the counts are initially 0.
- the router can either broadcast the entire bit array of the Bloom filter, the changes in the bit array, or let other routers fetch updates from it. Periodically, full updates should be sent. The exact method will be determined by the underlying routing protocol being used. A load factor between 8 and 16 works well, although routers can lower or raise it depending on their memory and network traffic concerns. Based on the load factor, four or more hash functions should be used in a specific embodiment.
- the hash functions are built by first calculating the MD5 signature of thecharacteristic, which yields 128 bits, and then taking four groups of 32 bits from it.
- MD5 (as described by A. J. Menzes et al. in Handbook of Applied Cryptography, CRC Press, 1997) is a cryptographic message digest algorithm that hashes arbitrary length strings to 128 bits. According to a specific embodiment, MD5 is selected because of its well-known properties and relatively fast implementation. Other embodiments using other comparable algorithms are also possible. Note that all routers will be using the same hash functions.
- Bloom filters provide a tradeoff between the memory requirement and the false positive ratio (which induces false hits). For routers, this translates into a tradeoff between bandwidth (in the form of extra packets being forwarded and extra receivers) and control overhead (in the form of memory requirements and the size of control packets between routers). Thus, if routers want to devote less memory to the summaries, they can do so at a slight increase of inter-router traffic.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU19330/01A AU772747B2 (en) | 1999-11-30 | 2000-11-30 | Characteristic routing |
CA002395347A CA2395347A1 (en) | 1999-11-30 | 2000-11-30 | Characteristic routing |
EP00982275A EP1236312A2 (en) | 1999-11-30 | 2000-11-30 | Characteristic routing |
JP2001541194A JP2003516035A (en) | 1999-11-30 | 2000-11-30 | Characteristic routing |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16842699P | 1999-11-30 | 1999-11-30 | |
US60/168,426 | 1999-11-30 | ||
US21366600P | 2000-06-23 | 2000-06-23 | |
US60/213,666 | 2000-06-23 | ||
US72838000A | 2000-11-28 | 2000-11-28 | |
US09/728,380 | 2000-11-28 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001041380A2 true WO2001041380A2 (en) | 2001-06-07 |
WO2001041380A3 WO2001041380A3 (en) | 2001-12-27 |
Family
ID=27389522
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/032514 WO2001041380A2 (en) | 1999-11-30 | 2000-11-30 | Characteristic routing |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1236312A2 (en) |
JP (1) | JP2003516035A (en) |
AU (1) | AU772747B2 (en) |
CA (1) | CA2395347A1 (en) |
WO (1) | WO2001041380A2 (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1331771A1 (en) * | 2002-01-24 | 2003-07-30 | Alcatel Canada Inc. | Method and apparatus for synchronizing redundant communication tasks |
WO2004055615A2 (en) | 2002-12-17 | 2004-07-01 | Saraph Girish P | Routing scheme based on virtual space representation |
EP1461882A2 (en) * | 2001-11-29 | 2004-09-29 | Ipsum Networks, Inc. | Method and system for topology construction and path identification in a two-level routing domain operated according to a simple link state routing protocol |
EP1461884A2 (en) * | 2001-11-29 | 2004-09-29 | Ipsum Networks, Inc. | Method and system for topology construction and path identification in a link state routing system |
WO2008057595A3 (en) * | 2006-11-08 | 2008-07-03 | Siemens Corp Res Inc | Connection maintenance in ieee 802. 16 networks with relays via cid encapsulation |
US7406035B2 (en) | 2002-01-24 | 2008-07-29 | Alcatel-Lucent Canada Inc. | Method and apparatus for providing redundant protocol processes in a network element |
WO2008151673A1 (en) | 2007-06-14 | 2008-12-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Routing in a network |
US7568049B2 (en) | 2003-09-25 | 2009-07-28 | British Telecommunications Plc | Computer networks |
US7787395B2 (en) | 2003-09-25 | 2010-08-31 | British Telecommunications Plc | Virtual networks |
US7970933B2 (en) | 2006-06-30 | 2011-06-28 | Ntt Docomo, Inc. | Ad hoc network, node, routing control method and routing control program |
US8005980B2 (en) | 2002-01-24 | 2011-08-23 | Alcatel Lucent | Method and apparatus for synchronizing redundant communication tasks |
CN103200099A (en) * | 2012-01-10 | 2013-07-10 | 迈普通信技术股份有限公司 | Method and device for rapidly searching target node in multi-protocol label switching (MPLS) |
WO2014072374A1 (en) * | 2012-11-09 | 2014-05-15 | Siemens Aktiengesellschaft | Method for transmitting messages in an industrial communication network of an industrial automation system and communication device for an industrial communication network |
US8769154B2 (en) | 2002-01-24 | 2014-07-01 | Alcatel Lucent | Method and apparatus for facilitating routing protocol redundancy in a network element |
WO2018087721A1 (en) * | 2016-11-11 | 2018-05-17 | Ologn Technologies Ag | Systems, apparatuses and methods for cooperating routers |
US10129879B2 (en) | 2010-02-23 | 2018-11-13 | Intel Corporation | Bandwidth and channel notification for wide-channel wireless communication |
US10791052B2 (en) | 2016-07-05 | 2020-09-29 | Ologn Technologies Ag | Systems, apparatuses and methods for network packet management |
US11570098B2 (en) | 2016-07-05 | 2023-01-31 | Six Impossible Things Before Breakfast Limited | Systems, apparatuses and methods for cooperating routers |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030212821A1 (en) * | 2002-05-13 | 2003-11-13 | Kiyon, Inc. | System and method for routing packets in a wired or wireless network |
JP4978288B2 (en) | 2007-04-19 | 2012-07-18 | 沖電気工業株式会社 | Wireless network system, information providing apparatus, and wireless terminal |
JP2011223494A (en) * | 2010-04-14 | 2011-11-04 | Fujitsu Ltd | Communication device and communication program |
JP5846634B2 (en) * | 2011-11-08 | 2016-01-20 | 国立研究開発法人情報通信研究機構 | Routing method based on potential in information-centric network and network using it |
KR102198349B1 (en) * | 2012-10-23 | 2021-01-05 | 삼성전자주식회사 | Source, relay and destination executing cooperation transmission and method for controlling each thereof |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6006264A (en) * | 1997-08-01 | 1999-12-21 | Arrowpoint Communications, Inc. | Method and system for directing a flow between a client and a server |
-
2000
- 2000-11-30 JP JP2001541194A patent/JP2003516035A/en active Pending
- 2000-11-30 EP EP00982275A patent/EP1236312A2/en not_active Withdrawn
- 2000-11-30 AU AU19330/01A patent/AU772747B2/en not_active Ceased
- 2000-11-30 WO PCT/US2000/032514 patent/WO2001041380A2/en not_active Application Discontinuation
- 2000-11-30 CA CA002395347A patent/CA2395347A1/en not_active Abandoned
Non-Patent Citations (2)
Title |
---|
PERLMAN, RADIA: "Interconnections: bridges, routers, switches and internetworking protocols" September 1999 (1999-09) , ADDISSON WESLEY LONGMAN , READING, MASS. XP002168242 page 23, line 28 page 24, line 17 - line 21 page 26, line 10 - line 11 page 26, line 31 -page 27, line 2 page 218, line 7 - line 9 figure 1.2 * |
See also references of EP1236312A2 * |
Cited By (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1461882A4 (en) * | 2001-11-29 | 2007-05-02 | Ipsum Networks Inc | Method and system for topology construction and path identification in a two-level routing domain operated according to a simple link state routing protocol |
EP1461884A4 (en) * | 2001-11-29 | 2010-09-15 | Iptivia Inc | Method and system for topology construction and path identification in a link state routing system |
EP1461882A2 (en) * | 2001-11-29 | 2004-09-29 | Ipsum Networks, Inc. | Method and system for topology construction and path identification in a two-level routing domain operated according to a simple link state routing protocol |
EP1461884A2 (en) * | 2001-11-29 | 2004-09-29 | Ipsum Networks, Inc. | Method and system for topology construction and path identification in a link state routing system |
EP1331771A1 (en) * | 2002-01-24 | 2003-07-30 | Alcatel Canada Inc. | Method and apparatus for synchronizing redundant communication tasks |
US7406035B2 (en) | 2002-01-24 | 2008-07-29 | Alcatel-Lucent Canada Inc. | Method and apparatus for providing redundant protocol processes in a network element |
US8005980B2 (en) | 2002-01-24 | 2011-08-23 | Alcatel Lucent | Method and apparatus for synchronizing redundant communication tasks |
US8769154B2 (en) | 2002-01-24 | 2014-07-01 | Alcatel Lucent | Method and apparatus for facilitating routing protocol redundancy in a network element |
EP1579716A2 (en) * | 2002-12-17 | 2005-09-28 | Girish P. Saraph | Routing scheme based on virtual space representation |
EP2595349A3 (en) * | 2002-12-17 | 2013-11-06 | Girish P. Saraph | Routing scheme based on virtual space representation |
EP1579716A4 (en) * | 2002-12-17 | 2010-07-07 | Girish P Saraph | Routing scheme based on virtual space representation |
WO2004055615A2 (en) | 2002-12-17 | 2004-07-01 | Saraph Girish P | Routing scheme based on virtual space representation |
US7568049B2 (en) | 2003-09-25 | 2009-07-28 | British Telecommunications Plc | Computer networks |
US7787395B2 (en) | 2003-09-25 | 2010-08-31 | British Telecommunications Plc | Virtual networks |
US7970933B2 (en) | 2006-06-30 | 2011-06-28 | Ntt Docomo, Inc. | Ad hoc network, node, routing control method and routing control program |
WO2008057595A3 (en) * | 2006-11-08 | 2008-07-03 | Siemens Corp Res Inc | Connection maintenance in ieee 802. 16 networks with relays via cid encapsulation |
WO2008151673A1 (en) | 2007-06-14 | 2008-12-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Routing in a network |
US10129879B2 (en) | 2010-02-23 | 2018-11-13 | Intel Corporation | Bandwidth and channel notification for wide-channel wireless communication |
CN103200099A (en) * | 2012-01-10 | 2013-07-10 | 迈普通信技术股份有限公司 | Method and device for rapidly searching target node in multi-protocol label switching (MPLS) |
CN103200099B (en) * | 2012-01-10 | 2016-08-24 | 迈普通信技术股份有限公司 | A kind of MPLS quickly searches the method and device of destination node |
WO2014072374A1 (en) * | 2012-11-09 | 2014-05-15 | Siemens Aktiengesellschaft | Method for transmitting messages in an industrial communication network of an industrial automation system and communication device for an industrial communication network |
US10841224B2 (en) | 2016-07-05 | 2020-11-17 | Ologn Technologies Ag | Systems, apparatuses and methods for network packet management |
US10791052B2 (en) | 2016-07-05 | 2020-09-29 | Ologn Technologies Ag | Systems, apparatuses and methods for network packet management |
US10841222B2 (en) | 2016-07-05 | 2020-11-17 | Ologn Technologies Ag | Systems, apparatuses and methods for network packet management |
US10841223B2 (en) | 2016-07-05 | 2020-11-17 | Ologn Technologies Ag | Systems, apparatuses and methods for network packet management |
US11563684B2 (en) | 2016-07-05 | 2023-01-24 | Six Impossible Things Before Breakfast | Systems, apparatuses and methods for network packet management |
US11570098B2 (en) | 2016-07-05 | 2023-01-31 | Six Impossible Things Before Breakfast Limited | Systems, apparatuses and methods for cooperating routers |
EP4135232A1 (en) * | 2016-07-05 | 2023-02-15 | Six Impossible Things Before Breakfast Limited | Systems, apparatuses and methods for network packet management |
US11601366B2 (en) | 2016-07-05 | 2023-03-07 | Six Impossible Things Before Breakfast Limited | Systems, apparatuses and methods for network packet management |
US11689461B2 (en) | 2016-07-05 | 2023-06-27 | Six Impossible Things Before Breakfast Limited | Systems, apparatuses and methods for network packet management |
US11689462B2 (en) | 2016-07-05 | 2023-06-27 | Six Impossible Things Before Breakfast Limited | Systems, apparatuses and methods for network packet management |
US11689460B2 (en) | 2016-07-05 | 2023-06-27 | Six Impossible Things Before Breakfast Limited | Systems, apparatuses and methods for network packet management |
US11855895B2 (en) | 2016-07-05 | 2023-12-26 | Six Impossible Things Before Breakfast Limited | Systems, apparatuses and methods for network packet management |
WO2018087721A1 (en) * | 2016-11-11 | 2018-05-17 | Ologn Technologies Ag | Systems, apparatuses and methods for cooperating routers |
Also Published As
Publication number | Publication date |
---|---|
WO2001041380A3 (en) | 2001-12-27 |
AU772747B2 (en) | 2004-05-06 |
CA2395347A1 (en) | 2001-06-07 |
JP2003516035A (en) | 2003-05-07 |
EP1236312A2 (en) | 2002-09-04 |
AU1933001A (en) | 2001-06-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20030026268A1 (en) | Characteristic routing | |
AU772747B2 (en) | Characteristic routing | |
US5361256A (en) | Inter-domain multicast routing | |
Moy | OSPF version 2 | |
Sivakumar et al. | Spine routing in ad hoc networks | |
Deering et al. | Multicast routing in datagram internetworks and extended LANs | |
US10454820B2 (en) | System and method for stateless information-centric networking | |
US7623474B2 (en) | Techniques for distributing information using multicast subsets | |
US8572225B2 (en) | Technique for graceful shutdown of a routing protocol in a network | |
US7065059B1 (en) | Technique for restoring adjacencies in OSPF in a non-stop forwarding intermediate node of a computer network | |
US7382731B1 (en) | Method and apparatus for updating probabilistic network routing information | |
Jain et al. | Viro: A scalable, robust and namespace independent virtual id routing for future networks | |
EP0937353A1 (en) | Routing in a multi-layer distributed network element | |
US20130148658A1 (en) | Systems and methods for scalable multicast communication using self-rooted forwarding trees | |
Qian et al. | ROME: Routing on metropolitan-scale Ethernet | |
CN113726907A (en) | Routing processing method, network element equipment, device and readable storage medium | |
US8018953B1 (en) | Adaptive, deterministic ant routing approach for updating network routing information | |
Abraham et al. | Routing strategies in delay tolerant networks: a survey | |
US20050053014A1 (en) | System and method of implementing contacts of small worlds in packet communication networks | |
CN115426308B (en) | Link state routing method under multi-identification network | |
US20030101279A1 (en) | Method for transferring messages along optimally redundant network paths in a distributed communication network | |
US6615273B1 (en) | Method for performing enhanced target identifier (TID) address resolution | |
Khayou et al. | A hybrid distance vector link state algorithm: distributed sequence number | |
Hong et al. | Dynamic group support in LANMAR routing ad hoc networks | |
KR100552518B1 (en) | The apparatus for implementation of ECMP in Network Processor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2395347 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 149916 Country of ref document: IL |
|
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 2001 541194 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2000982275 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 19330/01 Country of ref document: AU |
|
WWP | Wipo information: published in national office |
Ref document number: 2000982275 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWG | Wipo information: grant in national office |
Ref document number: 19330/01 Country of ref document: AU |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000982275 Country of ref document: EP |