WO2020100151A1 - Efficient method of computing backup routes - Google Patents

Efficient method of computing backup routes Download PDF

Info

Publication number
WO2020100151A1
WO2020100151A1 PCT/IN2018/050743 IN2018050743W WO2020100151A1 WO 2020100151 A1 WO2020100151 A1 WO 2020100151A1 IN 2018050743 W IN2018050743 W IN 2018050743W WO 2020100151 A1 WO2020100151 A1 WO 2020100151A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
affected
router
exit
destinations
Prior art date
Application number
PCT/IN2018/050743
Other languages
French (fr)
Inventor
Gundu SIKHIVAHAN
Original Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson (Publ) filed Critical Telefonaktiebolaget Lm Ericsson (Publ)
Priority to PCT/IN2018/050743 priority Critical patent/WO2020100151A1/en
Priority to EP18940368.6A priority patent/EP3881504A4/en
Priority to US17/292,525 priority patent/US11438258B2/en
Publication of WO2020100151A1 publication Critical patent/WO2020100151A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/18Loop-free operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/22Alternate routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation
    • H04L45/122Shortest path evaluation by minimising distances, e.g. by selecting a route with minimum of number of hops
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation
    • H04L45/123Evaluation of link metrics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/24Multipath
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/28Routing or path finding of packets in data switching networks using route fault recovery

Definitions

  • the disclosure relates generally to fast -re-routing in a packet- switched
  • each network node e.g. router or switch
  • IP Internet Protocol
  • MPLS Multi-Protocol Label Switching
  • LDP Label Distribution Protocol
  • each network node computes a shortest path to each destination and uses the shortest path for routing in non-failure conditions.
  • the routes or paths to each destination in the network are stored in a routing table.
  • a routing table is computed based on the new network topology. Computation of the new routing table can take between hundreds of milliseconds to a few seconds. If the previous routing table is used until the new routing table is computes, packets going through the failed link/node would be lost, potentially causing service disruption.
  • FRR Fast Rerouting
  • Loop-free alternatives avoid traffic loss by sending traffic to a neighboring node that can forward the traffic to destination without looping back to source.
  • Remote LFAs can be used if a LFA does not exist.
  • RLFAs use LDP tunnels to tunnel traffic to a non-neighbor“release node” from which the traffic can forwarded to the destination without looping back to the source.
  • the Internet Engineering Task Force (IETF) describes high-level algorithms to compute Loop-Free Alternates (LFA, RFC5286) and Remote Loop-Free Alternates (RLFA, RFC7490, RFC 8102). RLFA and TILFA derive backup paths by computing the intersection of extended P- Space and Q-Space.
  • TI-LFA Topology-Independent LFA
  • IETF IETF-Independent LFA
  • TI-LFA differs from RLFA by constraining the backup-path computation problem to require that, topologically, the backup path (PATH-B) must be the same as the primary path after the router re-converges following a link/node failure (PATH-2).
  • PATH-B the backup path
  • PATH-1 the backup path
  • PATH-2 link/node failure
  • overlay tunnels must be built on the (physical) PATH-2 to convert it to the (logical) PATH-B .
  • the conventional approach for backup path computation known as the“per-prefix” or“per-destination” approach, requires that a backup path be computed for all destinations known to the router.
  • a drawback of this approach is that a shortest path first (SPF) computation is performed for each backup path computation.
  • the SPF computation is the most computationally intensive part of calculating routing tables in link-state routing protocols.
  • the“per-prefix” or“per-destination” approach is inefficient and processor intensive.
  • the present disclosure relates generally to backup path computations for fast re routing in IP networks.
  • the techniques described in the present disclosure reduce the number of computations needed to compute TI-LFA backup paths by reducing the set of destinations for which it must be computed, recognizing destinations for which TI-LFA does not need to be computed or has already been computed.
  • the techniques described herein reduce the number of Q- space computations that need to be performed, each of which requires a SPF computation. Rather than naively perform a backup path computation for all destination, embodiments of the present disclosure identify those destination affected by that link or node failure and perform backup path computations only for the affected destinations.
  • the backup path computations are performed in a breath-first order relative to a subtree rooted at the node incident to the failed link (in the case of a link failure) or at the protected node (in the case of a node failure).
  • the breath-first order eliminates the need for SPF computations for some destinations by taking advantage of earlier SPF computations.
  • One aspect of the disclosure comprises methods of fast re-routing implemented by a source router in a communication network.
  • the source router determines a set of affected destinations in a new network topology based on the assumed failure of a protected link or protected node in an initial network topology.
  • the source router further determines a set of exit nodes in the new network topology associated with the affected destinations.
  • the source router iteratively computes, in a breath-first order relative to a Q- space rooted at a node incident to the failed link or at the protected node, backup paths for affected destinations associated with primary exit nodes in the set of exit nodes while skipping backup path computations for intermediate exit nodes in the set of exit nodes.
  • Another aspect of the disclosure comprises a router in a packet-switched
  • the communication network including a packet forwarding unit and a routing unit.
  • the packet forwarding unit is configured to receive packets over the packet- switched communication network and to forward the received packets toward a respective destination.
  • the routing unit is configured to iteratively compute, in a breath-first order relative to a subtree rooted at a node incident to the failed link or at the protected node, backup paths for affected destinations associated with primary exit nodes in the set of exit nodes while skipping backup path computations for intermediate exit nodes in the set of exit nodes.
  • the computer program product comprises program instructions that when executed by a processor in a router, causes the router to determine a set of affected destinations in a new network topology based on the assumed failure of a protected link or protected node in an initial network topology, determine a set of exit nodes in the new network topology associated with the affected destinations, and iteratively compute, in a breath-first order relative to a Q- space rooted at a node incident to the failed link or at the protected node, backup paths for affected destinations associated with primary exit nodes in the set of exit nodes while skipping backup path computations for intermediate exit nodes in the set of exit nodes.
  • the computer program product may be in a carrier, such as a non-transitory computer readable medium.
  • Figure 1 illustrates an exemplary network in a pre-failure condition.
  • Figure 2 illustrates the exemplary network with a link failure on the link to router H
  • Figure 3A illustrates the initial routing table prior to the link failure.
  • Figure 3B illustrates the new routing table after convergence.
  • Figure 4A illustrates an extended P-space of router S.
  • Figure 4B illustrates the Q-space of router H.
  • Figure 5 illustrates an exemplary method for computing backup paths according to an embodiment.
  • Figure 6 illustrates one iteration of the backup path computation.
  • Figure 7 illustrates a method of computing tunnel routing segments for a backup path.
  • Figure 8 illustrates a method for determining a set of affected destinations for which backup paths are needed.
  • Figure 9 illustrates another method for computing backup paths according to an embodiment.
  • FIGS 10A and 10B illustrate another method for computing backup paths according to an embodiment.
  • Figure 11 illustrates an exemplary router according to an embodiment.
  • FIG. 1 illustrates an exemplary communication network 10 which is used for purposes of explanation.
  • the communication network 10 comprises a plurality of routers 15 interconnected by links 20.
  • the routers 15 are indicated individually by letters A-H and S, where S represents the source router. Links are denoted individually by reference to the nodes at each end of the link. For example, the link between source router S and router H is referred to as Link S-H.
  • Routers A-H connect to respective destinations 25, which are denoted individually as Destinations P1-P8.
  • the numbers adjacent each link 20 represent the cost associated with the link for use in shortest path computations.
  • Figure 2 illustrates the same communication network 10 as shown in Figure 1 following a failure of link S-H between router S and router H.
  • the source router S temporarily switches to a backup path while it re-computes routing tables. Traffic is routed over a backup path (PATH-B) while the new routing table is computed thereby avoiding traffic loss.
  • PATH-B backup path
  • the router switches to the new primary path (PATH-2).
  • PATH-2 One requirement for a viable backup path is that it should be“loop-free”, i.e., packets must be able to reach the destination without looping between nodes.
  • TI-LFA is one commonly used technique for computing backup paths to protect against link or node failures.
  • TI-LFA constrains the backup-path computation problem by mandating that topologically, the backup path (PATH-B) must be the same as that would be used as primary path (PATH-2) after the router re-converges following a link/node failure.
  • PATH-2 cannot be directly used as a backup path before re-convergence, because it would cause packets to loop. For this reason, a logical path of tunnels is overlaid on PATH- 2 to convert it to a logical backup path (PATH-B).
  • a shortest path first (SPF) computation is performed for each backup path computation.
  • the SPF computation is the most computationally intensive part of calculating routing tables in link-state routing protocols.
  • the present disclosure reduces the number of SPF computations needed to compute TI-LFA backup paths by reducing the set of destinations for which a backup path must be computed, recognizing destinations for which TI-LFA does not need to be computed or has already been computed. It reduces the number of Q-space computations that need to be performed, each of which requires a SPF computation. Rather than naively perform a backup path computation for all destination, embodiments of the present disclosure identify those destination affected by that link or node failure and perform backup path computations only for the affected destinations.
  • the backup path computations are performed in a breath-first order relative to a Q-space rooted at the node incident to the failed link (in the case of a link failure) or at the protected node (in the case of a node failure).
  • the breath-first order eliminates the need for SPF computations for some destinations by recognizing that the backup paths for some destinations will be the same and taking advantage of earlier SPF computations. In effect, the breath-first order allows some destinations to inherit backup paths previously computed for other destinations.
  • the shortest-path routing table computed by a link-state protocol using Dijkstra’s Single-Source Shortest Path algorithm generates two pieces of information for every destination in the network, captured as the pair ⁇ Prefix, NextHop ⁇ .
  • Prefix encodes the destination network as an IP Address/Mask-Length
  • NextHop refers to the neighbor node that the source sends the packet to on its way to the destination associated with Prefix.
  • the exit node associated with each destination is also captured, converting the pair ⁇ Prefix, NextHop ⁇ to the triplet ⁇ Prefix, NextHop, LastHop].
  • LastHop is the last router on the shortest path from the source router to the destination. It is the router to which the destination is directly attached, referred to herein as the exit node.
  • This enhancement does not require significant additional computer processing unit (CPU) cycles.
  • Figure 3 A shows an initial routing table for the network illustrated in Figure 1.
  • the initial routing table includes the Prefix, NextHop and LastHop for each destination 25.
  • NextHop identifies the neighbor node 20 to which packets addressed to the destination associated with Prefix are forwarded.
  • NextHop for Destination P5 is router H.
  • LastHop identifies the exit node to which the destination is attached.
  • the exit node is router E.
  • a second routing table or SPF tree is generated premised on the assumption that a protected link or protected node has failed.
  • Figure 3B shows a post-convergence routing table for the communication network 10 assuming failure of Link S-H.
  • the new routing table includes, for each destination 25, the Prefix, NextHop and LastHop assuming failure of Link S-H.
  • the post-convergence routing table or SPF tree provides the physical routes on which the release nodes identified during backup path calculations must lie.
  • the second routing table or SPF tree is used to determine the destinations affected by the link failure or node failure.
  • NextHop for destinations P3-P8 is changed following the failure of Link S-H, while the NextHop for destinations P1-P2 remain the same.
  • Destinations for which NextHop remains the same e.g., PI and P2 are unaffected by the link failure or node failure and do not require a backup path.
  • the backup path is a first optimization.
  • the remaining destinations (e.g. P3-P8) require a backup paths to protect against the link failure or node failure. These destinations are referred to herein as the affected destinations.
  • the backup path computations according to TI-LFA require an extended P- space computation and a Q-space computation.
  • the backup paths for each destination are determined based on the extended P-space of the source router S and the Q- space of the exit node to which the affected destination is attached.
  • One or two tunnels are overlaid on the physical path.
  • the release node comprises the PQ node (the node lying in both the extended P-space and the Q-space).
  • packets are tunneled from the source router to the release node, from which packets can be forwarded to the destination without looping.
  • a PQ pair is identified.
  • the Q-node in the PQ pair is the release node to which packets are tunneled from the source router S.
  • a second tunnel is overlaid on the physical path from the P-node to the Q-node.
  • the computation of the extended P-space of the source router S assumes either link protection (i.e., incident link may fail) or node protection (a neighbor node may fail).
  • link protection i.e., incident link may fail
  • node protection a neighbor node may fail.
  • the extended P-space is computed in a manner known in the art.
  • the same extended P-Space applies to all affected destinations.
  • the Q-Space computation for an affected destination requires a SPF calculation and consumes significant CPU processing cycles.
  • the computations of the Q- space for the affected destinations can be onerous.
  • a second optimization performs Q-space computations for the affected destinations iteratively in a breath-first order relative to a subtree rooted at a node incident to the failed link (in the case of link failure) or at the protected node (in the case of node failure).
  • an exit node attached to an affected destination is selected and a Q-space computation is performed.
  • the exit nodes for which Q-space computations are performed are referred to herein as primary exit nodes.
  • other nodes lying on the backup for the primary exit node referred to herein as intermediate exit nodes, are identified.
  • Q-space computations for the destinations attached to the intermediate exit nodes are not needed. Rather, the backup path computed for the destination attached to the primary exit node can be inherited by the affected destinations attached to the intermediate exit nodes.
  • the Q-space computation for destinations attached to affected destinations continues as described above until a backup path is computed for each affected destination.
  • computation of the Q-space is performed for destinations attached to primary nodes only while Q-space computations for destinations attached to the intermediate exit nodes is skipped, which greatly reduces the number of computations for the backup path calculations.
  • the Q-space computations are performed by making a list of exit nodes associated with the affected destinations.
  • the exit node list comprises nodes C through H.
  • the exit nodes in the exit node list are processed in a breadth- first order relative to a subtree rooted at the node incident to a failed link or the protected node.
  • the subtree in this example, shown in Figure 4B, is rooted at node H.
  • the term "breadth-first order" means that the exit nodes are processed in an order according to the“level” of the exit node, where“level” is the distance from the root node of the subtree measured in number of hops.
  • the root node is designated as a level 0 node.
  • Level 1 nodes are the neighbors of the root node
  • Level 2 nodes are the neighbors of Level 1 nodes
  • node H is a Level 0 node or root node
  • routers F and G are Level 1 nodes
  • routers D and E are Level 2 nodes
  • router C is a Level 3 node.
  • a breadth-first order may comprise the order ⁇ H, F, G, D, E, C ⁇ . The order may be switched for nodes in the same level.
  • the order ⁇ H, G, F, E, D, C ⁇ is also a breadth-first order.
  • Q-space computation begin with the lowest level exit node in the exit node list and proceed in breath-first order (i.e. lowest level first). Where two or more exit nodes are at the same level, the source router S may the exit nodes at the same level in any order.
  • the lowest order exit node or exit nodes are moved from the exit node list to a candidate node list.
  • the candidate node list may be implemented as a first-in, first-out (FIFO) buffer.
  • FIFO first-in, first-out
  • the source router S selects the first entry in the candidate node list and computes the Q-space for the selected exit node.
  • the first entry in the candidate node list is a primary exit node. Each time an entry in the candidate node list is selected, its neighbor nodes in the exit node list are enqueued in the candidate node list and deleted from the exit node list.
  • the source router S intersects the Q-space for the primary exit node with the extended P-space for the source node, and identifies the PQ-node, if any, or the PQ pair.
  • the P and Q nodes are selected such that they lie on the post-convergence path to meet TI-LFA criterion.
  • An entry is then made in a backup path list including the triple (LastHop, P-node, Q-node), where LastHop indicates the primary exit node.
  • the Q-node will serve as the release node for the backup path.
  • the intermediate exit nodes that inherit a backup path are deleted from the exit node list and candidate node list. After the intermediate exit nodes are processed, the next entry in the candidate node list is selected and the process as described above is repeated.
  • the process of enqueuing entries into the candidate node list and deleting them from the exit node list effects a sorting of the exit nodes in a breadth-first order.
  • the use of the candidate node list to effect sorting of the exit nodes is only one example implementation and that use of the candidate node list is not required.
  • the entries in the exit node list could be sorted in a breadth-first order before the Q-space computations are started.
  • the exit nodes could be selected in order directly from the exit node list.
  • the source router S iterates through the destinations in its initial routing table and installs the computed backup path for each destination where LastHop in the initial routing table matches an entry in the backup table.
  • the backup path comprises the triple ⁇ Prefix, Tunnell, Tunnel ⁇ .
  • Tunnell is a Segment- Routing segment from the source router S to the P-node or PQ-node.
  • Tunnel2 is the second routing adjacency segment from the P-node to the Q-node where no PQ node exits. Tunnel2 is required only in the case of DLFA. In cases where a PQ node exists, Tunnel2 is either omitted or left null.
  • Performing the Q-space computations in breadth-first order while skipping Q-space computations for intermediate exit nodes greatly reduces the number of computations that need to be performed to compute the backup paths for all affected destinations. That is, the techniques herein described enable the source router S to skip Q-space computations for intermediate exit nodes. Instead, the intermediate exit nodes inherit the backup path previously computed for a primary exit node. For example, if X is the release node for destination D and if Y and Z are on the shortest path from X to D, then X is also the release node for Y and Z. Therefore, the Q-space computation does not need to be repeated for Y and Z. The breadth-first order of computations exploits this relationship.
  • the source router S Having eliminated PI and P2, the source router S generates a list of the exit nodes associated with the affected destinations.
  • the affected destinations are ⁇ P3, P4, P5, P6, P7, P8 ⁇ and the exit node list associated with the affected destinations comprises ⁇ C, D, E. F, G, and H ⁇ .
  • the reduced complexity method described herein computes backup paths in the order suggested by a breadth-first traversal of the subtree rooted at H, effectively yielding the order ⁇ H, F, G, D, E, C ⁇ .
  • the source router S initializes the candidate node list to the set ⁇ H ⁇ and deletes H from the exit node list.
  • the candidate node list is initialized with only one node, so the source router S selects H to begin the Q- space computations.
  • nodes F and G are enqueued in the candidate node list and deleted from the exit node list.
  • C is the release node.
  • the source router S After identifying the release node, the source router S identifies D-G as intermediate exit nodes lying on the shortest path from C to H. Because the release node will be the same for intermediate nodes C-G, Q-space computations for these nodes can be skipped.
  • backup paths are entered in the backup path list for these intermediate exit nodes using the same P-space and Q-space.
  • the backup paths for routers C-G are:
  • the source router S deletes intermediate nodes C-G from both the exit node list and the candidate node list. Because both lists are now empty, the process ends with only one Q- space computation being performed as opposed to six for the naive order.
  • backup paths are computed assuming that H itself has failed.
  • candidate node list is initialized to the set of H’s neighbors, i.e., the set ⁇ F, G ⁇ .
  • nodes D and C are identified as intermediate exit nodes and inherit the backup path computed for F.
  • Nodes D and C are then deleted from the exit node list.
  • Backup paths are still needed for G and E, so the source router S selects G from the candidate node list and performs a second Q-space computation for G.
  • node E is identified as intermediate exit node and inherits the backup path computed for G. This process results in two Q-space computations versus five in the naive order.
  • Figure 5 illustrates an exemplary method 100 implemented by a source router S according to one exemplary embodiment.
  • the method 100 is used to compute backup paths for fast re-routing in the event of a link failure or node failure.
  • the source router S initially determines a set of affected destinations in a new network topology based on an assumed failure of a protected link or protected node in an initial network topology (block 110).
  • the affected destinations comprise the set of destinations where NextHop is changed.
  • the source router S determines a set of exit nodes in the new network topology associated with the affected destinations (block 120).
  • the set of exit nodes are identified by LastHop in the initial routing table.
  • the source router S then iteratively computes, in a breadth-first order relative to a Q-space rooted at a node incident to the failed link or at the protected node, backup path for affected destinations associated with primary exit nodes in the set of exit nodes while skipping backup path computations for intermediate exit nodes in the set of exit nodes (block 130).
  • Figure 6 illustrates one iteration in the backup path computations performed at block 130 in Figure 5.
  • the source router S computes a Q-space for a selected one of the primary exit nodes (block 140).
  • the source router S determines a release node for the selected exit node (block 150).
  • the source router S computes tunnel routing segments from the source node to the release node (block 160).
  • one or more intermediate exit nodes may exist on the backup path from the release node and the primary exit node.
  • the source router S identifies one or more intermediate exit nodes, if any, on a path from the release node to a primary exit node in the current iteration (block 170).
  • the source router S assigns the backup path for the affected destinations connected to a current primary exit node to the one or more affected destinations associated with the intermediate exit nodes (block 180).
  • Figure 7 illustrates a method 200 for computing tunnel routing segments.
  • the extended P-space of the source router S is determined and the P-node is identified (step 210).
  • the extended P-space of the source router S is intersected with the Q- space of an exit node to determine whether a PQ-node exists (block 220). If so, and the source router S computes a tunnel from the source router S to the PQ-node (block 230). In this case, the PQ node is the release node and only one tunnel is required so the process ends (block 260). If the P-space and Q-space do not intersect so that no PQ-node exists, the source router S computes a tunnel from the source router S to the P-node (block 240).
  • the source router S then computes a second tunnel from the P-node to the Q-node (block 250).
  • the Q-node is the release node.
  • the computed tunnels are installed as a backup for the destination associated with the exit node.
  • Figure 8 illustrates an exemplary method 300 for determining the set of affected destinations at block 210 in Figure 5.
  • the source router S computes an initial routing table based on an initial network topology (block 310).
  • the initial routing table includes a NextHop for each destination.
  • the source router S also computes a new routing table based on a new network topology resulting from an assumed failure of a protected link or protected node (block 320).
  • the new routing table includes a new NextHop for each destination.
  • the source router S determines the set of affected destinations by comparing the NextHop and new NextHop for each destination (block 330).
  • the affected destinations comprise those destinations where the NextHop is changed.
  • Figures 9 illustrate another method 400 performed by the source router S for computing backup paths according to the TI-LFA criterion.
  • the source router S determines a set of exit nodes associated with affected destinations as previously described (block 410). After defining the set of exit nodes for the affected destinations, the source router S begins the backup path computations (block 420-460). As previously noted, the source router S iterates through the exit nodes associated with the affected destination S in a breath-first order relative to a subtree rooted at a node incident to the failed link or at the protected node. The source router S calculates a backup path for each primary exit node while skipping backup path calculations for intermediate exit nodes.
  • the source router S selects, in a breath-first order, a first one of the primary exit nodes in the set of exit nodes (block 420). The source router S then computes the backup path for the affected destination associated with the selected exit node (block 430). The computation performed at block 430 involves a Q-space computation as previously described. Next, the source router S determines whether any intermediate exit nodes in the set of exit nodes are present on the just computer backup path from the release node to the exit node (block 440). If so, the source router S assigns the computed backup path for the selected exit node to the intermediate exit node (block 450).
  • the source router S determines whether there are any more exit nodes to process (block 460). At block 460, the source router determines whether any more exit nodes exists that have not been process (block 460). If so, processing returns to block 420 for the next iteration. Otherwise, the process ends (block 470).
  • the source router S selects, in breath-first order, the next primary exit node in the set of exit nodes (block 420).
  • the selection of the exit nodes in the exit node list proceeds in a breadth-first order relative to a Q-space or subtree anchored at a node incident to the failed link, or at the protected node.
  • the processing proceeds as shown in blocks 430-460.
  • the process ends (block 470).
  • Figures 10A and 10B illustrate another method 500 performed by the source router S for computing backup paths according to the TI-LFA criterion.
  • the source router S determines a set of exit nodes associated with affected destinations as previously described (block 505).
  • the source router S After defining the set of exit nodes for the affected destinations, the source router S begins the backup path computations (block 510-555). As previously noted, the source router S iterates through the exit nodes associated with the affected destination S in a breath-first order relative to a subtree rooted at a node incident to the failed link or at the protected node. The source router S calculates a backup path for each primary exit node while skipping backup path calculations for intermediate exit nodes. In the first iteration of the backup path computations, the source router S selects the lowest order exit node for which a backup path is needed (block 510). The selected exit node will be a primary exit node. The source router S then computes the backup path for the affected destination associated with the selected exit node (block 515).
  • the computation performed at block 515 involves a Q-space computation as previously described.
  • the source router S determines the release node in the Q-space of the selected exit node and computes one or more tunnel routing segments from the source router S to the release node (block 520).
  • the source router S removes the selected exit node from the exit node list (block 530). The deletion of the selected node can be done before or after the Q-space computation at block 515.
  • the source router S determines whether any intermediate exit nodes in the set of exit nodes are present on the just computed backup path from the release node to the selected exit node (block 540). If not, the source router S determines whether there are any more exit nodes to process (block 555).
  • processing returns to block 510 for the next iteration. If not, the process ends (block 560). If intermediate exit nodes exist on the computed backup path, the source router S assigns the same backup path to the intermediate exit nodes and deletes the intermediate exit nodes from the exit node list (blocks 545, 550). The source router S determines whether there are any more exit nodes to process (block 555). If so, processing returns to block 510 for the next iteration. If not, the process ends (block 560).
  • FIG 11 illustrates an exemplary source router S indicated by the numeral 600.
  • the source router S comprises a packet forwarding unit 610, a routing unit 620, and memory 630.
  • the packet forwarding unit includes an interface 615 for receiving and forwarding packets.
  • the packet forwarding unit includes a network interface 615 and related processing circuitry for receiving and forwarding packets.
  • the routing unit 620 comprises processing circuitry to compute the routing tables that are used by the packet forwarding unit 610 to forward packets.
  • the routing unit 620 is configured in one embodiment to perform the methods shown in Figures 5-9.
  • the processing circuitry for the packet forwarding unit 610 and routing unit 620 may, for example, comprise one or more microprocessors, hardware circuits, application- specific integrated circuits (ASICs), filed programmable gate arrays (FPGAs), or a combination thereof.
  • the packet forwarding unit 610 and routing unit 620 may share processing resources.
  • the functions of the packet forwarding unit 610 and routing unit 620 may be implemented by a single microprocessor. In other embodiments, the functions of the packet forwarding unit 610 and routing unit 620 may be implemented by different microprocessors.
  • Memory 630 stores routing tables 640 used by the packet forwarding unit 610 to receive and forward packets and computer programs 660 to configure the packet forwarding unit 610 and routing unit 620.
  • the computer programs 660 may comprise a packet forwarding program executed by the packet forwarding unit 610 to receive and forward packets, and a routing program executed by the routing unit 620 to compute the backup paths as herein described.
  • the techniques described herein reduce the number of computations needed to compute TI-LFA backup path. Reducing the number of computations will in turn reduce the amount of time and hardware resource needed to perform the backup path computations.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A method implemented by a source router reduces the number of SPF computations needed to compute TI-LFA backup paths. Rather than naively perform a backup path computation for all destinations, the source router identifies those destinations affected by that link or node failure and performs backup path computations only for the affected destinations. For the remaining destinations (i.e., those for which a backup path is required), the backup path computations are performed in a breath-first order relative to a subtree rooted at the node incident to the failed link (in the case of a link failure) or at the protected node (in the case of a node failure). The breath-first order further reduces the number of computations required by taking advantage of earlier backup path computations.

Description

EFFICIENT METHOD OF COMPUTING BACKUP ROUTES
TECHNICAL FIELD
The disclosure relates generally to fast -re-routing in a packet- switched
communication network and, more particularly, to the computation of backup paths for fast re-routing.
BACKGROUND
In a typical packet-switched network, such as an Internet Protocol (IP) network or Multi-Protocol Label Switching (MPLS)/Label Distribution Protocol (LDP) network, each network node, e.g. router or switch, computes a shortest path to each destination and uses the shortest path for routing in non-failure conditions. The routes or paths to each destination in the network are stored in a routing table. When a link or another node attached to an IP router fails, a routing table is computed based on the new network topology. Computation of the new routing table can take between hundreds of milliseconds to a few seconds. If the previous routing table is used until the new routing table is computes, packets going through the failed link/node would be lost, potentially causing service disruption.
Fast Rerouting (FRR) solutions provide protection against link or node failures by computing in advance alternate routes, also called backup routes, that can be activated instantly when a link or node failure occurs. Initially, the source router is using a primary path (PATH-1) to a destination. When a link/node fails, it switches to a backup path (PATH- B) while it re-computes routing tables. Traffic is routed over the backup path while the new routing table is computed thereby avoiding traffic loss. When the new table has been computed, the router switches to a new primary path (PATH-2).
One requirement for a viable backup path is that it should be“loop-free”, i.e., packets must be able to reach the destination without looping between nodes. Loop-free alternatives (LFAs) avoid traffic loss by sending traffic to a neighboring node that can forward the traffic to destination without looping back to source. Remote LFAs can be used if a LFA does not exist. RLFAs use LDP tunnels to tunnel traffic to a non-neighbor“release node” from which the traffic can forwarded to the destination without looping back to the source. The Internet Engineering Task Force (IETF) describes high-level algorithms to compute Loop-Free Alternates (LFA, RFC5286) and Remote Loop-Free Alternates (RLFA, RFC7490, RFC 8102). RLFA and TILFA derive backup paths by computing the intersection of extended P- Space and Q-Space.
Another technique called Topology-Independent LFA (TI-LFA, proposed IETF standard) is used in segment routing networks to provide loop-free backup paths. TI-LFA differs from RLFA by constraining the backup-path computation problem to require that, topologically, the backup path (PATH-B) must be the same as the primary path after the router re-converges following a link/node failure (PATH-2). In the pre-convergence scenario, it is PATH-1 that is loop-free, not PATH-2. So overlay tunnels must be built on the (physical) PATH-2 to convert it to the (logical) PATH-B . The conventional approach for backup path computation, known as the“per-prefix” or“per-destination” approach, requires that a backup path be computed for all destinations known to the router. A drawback of this approach is that a shortest path first (SPF) computation is performed for each backup path computation. The SPF computation is the most computationally intensive part of calculating routing tables in link-state routing protocols. Thus, the“per-prefix” or“per-destination” approach is inefficient and processor intensive.
SUMMARY
The present disclosure relates generally to backup path computations for fast re routing in IP networks. The techniques described in the present disclosure reduce the number of computations needed to compute TI-LFA backup paths by reducing the set of destinations for which it must be computed, recognizing destinations for which TI-LFA does not need to be computed or has already been computed. The techniques described herein reduce the number of Q- space computations that need to be performed, each of which requires a SPF computation. Rather than naively perform a backup path computation for all destination, embodiments of the present disclosure identify those destination affected by that link or node failure and perform backup path computations only for the affected destinations. For the remaining destinations (i.e., those for which a backup path is required), the backup path computations are performed in a breath-first order relative to a subtree rooted at the node incident to the failed link (in the case of a link failure) or at the protected node (in the case of a node failure). The breath-first order eliminates the need for SPF computations for some destinations by taking advantage of earlier SPF computations.
One aspect of the disclosure comprises methods of fast re-routing implemented by a source router in a communication network. The source router determines a set of affected destinations in a new network topology based on the assumed failure of a protected link or protected node in an initial network topology. The source router further determines a set of exit nodes in the new network topology associated with the affected destinations. The source router iteratively computes, in a breath-first order relative to a Q- space rooted at a node incident to the failed link or at the protected node, backup paths for affected destinations associated with primary exit nodes in the set of exit nodes while skipping backup path computations for intermediate exit nodes in the set of exit nodes.
Another aspect of the disclosure comprises a router in a packet-switched
communication network including a packet forwarding unit and a routing unit. The packet forwarding unit is configured to receive packets over the packet- switched communication network and to forward the received packets toward a respective destination. The routing unit is configured to iteratively compute, in a breath-first order relative to a subtree rooted at a node incident to the failed link or at the protected node, backup paths for affected destinations associated with primary exit nodes in the set of exit nodes while skipping backup path computations for intermediate exit nodes in the set of exit nodes.
Another aspect of the disclosure comprises a computer program product for a router in a packet- switched communication network. The computer program product comprises program instructions that when executed by a processor in a router, causes the router to determine a set of affected destinations in a new network topology based on the assumed failure of a protected link or protected node in an initial network topology, determine a set of exit nodes in the new network topology associated with the affected destinations, and iteratively compute, in a breath-first order relative to a Q- space rooted at a node incident to the failed link or at the protected node, backup paths for affected destinations associated with primary exit nodes in the set of exit nodes while skipping backup path computations for intermediate exit nodes in the set of exit nodes. The computer program product may be in a carrier, such as a non-transitory computer readable medium.
BRIEF DESCRPTION OF THE FIGURES
Figure 1 illustrates an exemplary network in a pre-failure condition.
Figure 2 illustrates the exemplary network with a link failure on the link to router H
Figure 3A illustrates the initial routing table prior to the link failure.
Figure 3B illustrates the new routing table after convergence.
Figure 4A illustrates an extended P-space of router S.
Figure 4B illustrates the Q-space of router H.
Figure 5 illustrates an exemplary method for computing backup paths according to an embodiment.
Figure 6 illustrates one iteration of the backup path computation.
Figure 7 illustrates a method of computing tunnel routing segments for a backup path. Figure 8 illustrates a method for determining a set of affected destinations for which backup paths are needed.
Figure 9 illustrates another method for computing backup paths according to an embodiment.
Figures 10A and 10B illustrate another method for computing backup paths according to an embodiment.
Figure 11 illustrates an exemplary router according to an embodiment.
DETAILED DESCRIPTION
Referring now to the drawings, Figure 1 illustrates an exemplary communication network 10 which is used for purposes of explanation. The communication network 10 comprises a plurality of routers 15 interconnected by links 20. The routers 15 are indicated individually by letters A-H and S, where S represents the source router. Links are denoted individually by reference to the nodes at each end of the link. For example, the link between source router S and router H is referred to as Link S-H. Routers A-H connect to respective destinations 25, which are denoted individually as Destinations P1-P8. The numbers adjacent each link 20 represent the cost associated with the link for use in shortest path computations.
Figure 2 illustrates the same communication network 10 as shown in Figure 1 following a failure of link S-H between router S and router H. When the link S-H fails, the source router S temporarily switches to a backup path while it re-computes routing tables. Traffic is routed over a backup path (PATH-B) while the new routing table is computed thereby avoiding traffic loss. When the new routing table has been computed, the router switches to the new primary path (PATH-2). One requirement for a viable backup path is that it should be“loop-free”, i.e., packets must be able to reach the destination without looping between nodes. TI-LFA is one commonly used technique for computing backup paths to protect against link or node failures. TI-LFA constrains the backup-path computation problem by mandating that topologically, the backup path (PATH-B) must be the same as that would be used as primary path (PATH-2) after the router re-converges following a link/node failure. PATH-2, however, cannot be directly used as a backup path before re-convergence, because it would cause packets to loop. For this reason, a logical path of tunnels is overlaid on PATH- 2 to convert it to a logical backup path (PATH-B). A drawback of TI-LFA is the
computational complexity of the backup path computations. A shortest path first (SPF) computation is performed for each backup path computation. The SPF computation is the most computationally intensive part of calculating routing tables in link-state routing protocols.
The present disclosure reduces the number of SPF computations needed to compute TI-LFA backup paths by reducing the set of destinations for which a backup path must be computed, recognizing destinations for which TI-LFA does not need to be computed or has already been computed. It reduces the number of Q-space computations that need to be performed, each of which requires a SPF computation. Rather than naively perform a backup path computation for all destination, embodiments of the present disclosure identify those destination affected by that link or node failure and perform backup path computations only for the affected destinations. For the remaining destinations (i.e., those for which a backup path is required), the backup path computations are performed in a breath-first order relative to a Q-space rooted at the node incident to the failed link (in the case of a link failure) or at the protected node (in the case of a node failure). The breath-first order eliminates the need for SPF computations for some destinations by recognizing that the backup paths for some destinations will be the same and taking advantage of earlier SPF computations. In effect, the breath-first order allows some destinations to inherit backup paths previously computed for other destinations.
Conventionally, the shortest-path routing table computed by a link-state protocol using Dijkstra’s Single-Source Shortest Path algorithm generates two pieces of information for every destination in the network, captured as the pair {Prefix, NextHop}. Prefix encodes the destination network as an IP Address/Mask-Length, and NextHop refers to the neighbor node that the source sends the packet to on its way to the destination associated with Prefix. According to an aspect of the present disclosure, the exit node associated with each destination is also captured, converting the pair {Prefix, NextHop} to the triplet {Prefix, NextHop, LastHop]. LastHop is the last router on the shortest path from the source router to the destination. It is the router to which the destination is directly attached, referred to herein as the exit node. This enhancement does not require significant additional computer processing unit (CPU) cycles.
Figure 3 A shows an initial routing table for the network illustrated in Figure 1. As shown in Figure 3A, the initial routing table includes the Prefix, NextHop and LastHop for each destination 25. NextHop, as noted above, identifies the neighbor node 20 to which packets addressed to the destination associated with Prefix are forwarded. For example, NextHop for Destination P5 is router H. LastHop identifies the exit node to which the destination is attached. Using again as an example, the exit node is router E.
According to one aspect of the disclosure, a second routing table or SPF tree is generated premised on the assumption that a protected link or protected node has failed. Figure 3B shows a post-convergence routing table for the communication network 10 assuming failure of Link S-H. As shown in Figure 3B, the new routing table includes, for each destination 25, the Prefix, NextHop and LastHop assuming failure of Link S-H. As described in more detail below, the post-convergence routing table or SPF tree provides the physical routes on which the release nodes identified during backup path calculations must lie.
According to one aspect of the disclosure, the second routing table or SPF tree is used to determine the destinations affected by the link failure or node failure. Referring to Figures 3 A and 3B, it is noted that NextHop for destinations P3-P8 is changed following the failure of Link S-H, while the NextHop for destinations P1-P2 remain the same. Destinations for which NextHop remains the same (e.g., PI and P2) are unaffected by the link failure or node failure and do not require a backup path. As a first optimization, the backup path
computations are not performed for the unaffected destinations. The remaining destinations (e.g. P3-P8) require a backup paths to protect against the link failure or node failure. These destinations are referred to herein as the affected destinations.
The backup path computations according to TI-LFA require an extended P- space computation and a Q-space computation. Conventionally, the backup paths for each destination are determined based on the extended P-space of the source router S and the Q- space of the exit node to which the affected destination is attached. One or two tunnels are overlaid on the physical path. Where the extended P-space and Q-space intersect, the release node comprises the PQ node (the node lying in both the extended P-space and the Q-space). In this case, packets are tunneled from the source router to the release node, from which packets can be forwarded to the destination without looping. When the extended P-space and the Q-space do not intersect, a PQ pair is identified. The Q-node in the PQ pair is the release node to which packets are tunneled from the source router S. A second tunnel is overlaid on the physical path from the P-node to the Q-node.
The computation of the extended P-space of the source router S assumes either link protection (i.e., incident link may fail) or node protection (a neighbor node may fail). The extended P-space is computed in a manner known in the art. The same extended P-Space applies to all affected destinations.
The Q-Space computation for an affected destination requires a SPF calculation and consumes significant CPU processing cycles. For large networks, the computations of the Q- space for the affected destinations can be onerous.
According to one aspect of the disclosure, a second optimization performs Q-space computations for the affected destinations iteratively in a breath-first order relative to a subtree rooted at a node incident to the failed link (in the case of link failure) or at the protected node (in the case of node failure). During each iteration, an exit node attached to an affected destination is selected and a Q-space computation is performed. The exit nodes for which Q-space computations are performed are referred to herein as primary exit nodes. After the Q-space computation is complete for a primary exit node, other nodes lying on the backup for the primary exit node, referred to herein as intermediate exit nodes, are identified. Q-space computations for the destinations attached to the intermediate exit nodes are not needed. Rather, the backup path computed for the destination attached to the primary exit node can be inherited by the affected destinations attached to the intermediate exit nodes.
The Q-space computation for destinations attached to affected destinations continues as described above until a backup path is computed for each affected destination. Thus, computation of the Q-space is performed for destinations attached to primary nodes only while Q-space computations for destinations attached to the intermediate exit nodes is skipped, which greatly reduces the number of computations for the backup path calculations.
In one exemplary embodiment, the Q-space computations are performed by making a list of exit nodes associated with the affected destinations. In this example, the exit node list comprises nodes C through H. The exit nodes in the exit node list are processed in a breadth- first order relative to a subtree rooted at the node incident to a failed link or the protected node. The subtree in this example, shown in Figure 4B, is rooted at node H. As used herein, the term "breadth-first order" means that the exit nodes are processed in an order according to the“level” of the exit node, where“level” is the distance from the root node of the subtree measured in number of hops. The root node is designated as a level 0 node. Level 1 nodes are the neighbors of the root node, Level 2 nodes are the neighbors of Level 1 nodes, and so forth. In the example given herein, node H is a Level 0 node or root node, routers F and G are Level 1 nodes, routers D and E are Level 2 nodes, and router C is a Level 3 node. Thus, in this example, a breadth-first order may comprise the order {H, F, G, D, E, C}. The order may be switched for nodes in the same level. Thus, the order {H, G, F, E, D, C} is also a breadth-first order. Q-space computation begin with the lowest level exit node in the exit node list and proceed in breath-first order (i.e. lowest level first). Where two or more exit nodes are at the same level, the source router S may the exit nodes at the same level in any order.
In one embodiment, the lowest order exit node or exit nodes are moved from the exit node list to a candidate node list. The candidate node list may be implemented as a first-in, first-out (FIFO) buffer. When an exit node is enqueued in the candidate node list, it is deleted from the exit node list. After the initialization of the candidate node list, the source router S selects the first entry in the candidate node list and computes the Q-space for the selected exit node. The first entry in the candidate node list is a primary exit node. Each time an entry in the candidate node list is selected, its neighbor nodes in the exit node list are enqueued in the candidate node list and deleted from the exit node list. After the Q-space is computed, the source router S, intersects the Q-space for the primary exit node with the extended P-space for the source node, and identifies the PQ-node, if any, or the PQ pair. The P and Q nodes are selected such that they lie on the post-convergence path to meet TI-LFA criterion. An entry is then made in a backup path list including the triple (LastHop, P-node, Q-node), where LastHop indicates the primary exit node. As described in more detail below, the Q-node will serve as the release node for the backup path. The intermediate exit nodes lying on the shortest path from the release node to the primary exit node, if present in the exit node list and/or candidate node list, inherit the backup path computed for the corresponding primary exit node. For each intermediate exit node, an entry is created in the backup path list including the triple {LastHop, P-node, Q-node), where LastHop indicates the intermediate exit node. The intermediate exit nodes that inherit a backup path are deleted from the exit node list and candidate node list. After the intermediate exit nodes are processed, the next entry in the candidate node list is selected and the process as described above is repeated. Each time a candidate node is selected, its neighbor nodes in the exit node list are enqueued into the candidate node list and deleted from the exit node list. The Q-space computations are complete when the candidate node list and exit node list are empty.
The process of enqueuing entries into the candidate node list and deleting them from the exit node list effects a sorting of the exit nodes in a breadth-first order. Those skilled in the art will appreciate that the use of the candidate node list to effect sorting of the exit nodes is only one example implementation and that use of the candidate node list is not required.
For example, in another embodiment, the entries in the exit node list could be sorted in a breadth-first order before the Q-space computations are started. In this case, the exit nodes could be selected in order directly from the exit node list.
Once the Q-space computations are completed, the source router S iterates through the destinations in its initial routing table and installs the computed backup path for each destination where LastHop in the initial routing table matches an entry in the backup table. The backup path comprises the triple {Prefix, Tunnell, Tunnel}. Tunnell is a Segment- Routing segment from the source router S to the P-node or PQ-node. Tunnel2 is the second routing adjacency segment from the P-node to the Q-node where no PQ node exits. Tunnel2 is required only in the case of DLFA. In cases where a PQ node exists, Tunnel2 is either omitted or left null.
Performing the Q-space computations in breadth-first order while skipping Q-space computations for intermediate exit nodes greatly reduces the number of computations that need to be performed to compute the backup paths for all affected destinations. That is, the techniques herein described enable the source router S to skip Q-space computations for intermediate exit nodes. Instead, the intermediate exit nodes inherit the backup path previously computed for a primary exit node. For example, if X is the release node for destination D and if Y and Z are on the shortest path from X to D, then X is also the release node for Y and Z. Therefore, the Q-space computation does not need to be repeated for Y and Z. The breadth-first order of computations exploits this relationship.
Referring to Figure 2, an example of the backup path computations is given where Link S-H has failed. Comparing the tables shown in Figures 3 A and 3B, it is noted that NextHop is changed for the destinations associated with prefixes {P3, P4, P5, P6, P7, P8}. NextHop for destinations associated with destinations PI and P2 are unchanged, meaning that these destinations are unaffected by the failure of Link S-H. As a first optimization, the source router S eliminates destinations PI and P2 from the backup path computations.
Having eliminated PI and P2, the source router S generates a list of the exit nodes associated with the affected destinations. The affected destinations are {P3, P4, P5, P6, P7, P8} and the exit node list associated with the affected destinations comprises {C, D, E. F, G, and H}.
If the backup paths for are computed in the order given above, six Q-space
computations will be required; one for each member of the list. The reduced complexity method described herein, in contrast, computes backup paths in the order suggested by a breadth-first traversal of the subtree rooted at H, effectively yielding the order {H, F, G, D, E, C}. The source router S initializes the candidate node list to the set {H} and deletes H from the exit node list. In this example, the candidate node list is initialized with only one node, so the source router S selects H to begin the Q- space computations. When H is selected, nodes F and G are enqueued in the candidate node list and deleted from the exit node list. The computed backup path is {LastHop = H, P-router = B, Q-router = C; via A}, which is entered into the backup path list. In this example, C is the release node.
After identifying the release node, the source router S identifies D-G as intermediate exit nodes lying on the shortest path from C to H. Because the release node will be the same for intermediate nodes C-G, Q-space computations for these nodes can be skipped.
Therefore, backup paths are entered in the backup path list for these intermediate exit nodes using the same P-space and Q-space. The backup paths for routers C-G are:
{LastHop = G, P-router = B, Q-router = C; via A}
{LastHop = F, P-router = B, Q-router = C; via A}
{LastHop = E, P-router = B, Q-router = C; via A}
{LastHop = D, P-router = B, Q-router = C; via A}
{LastHop = C, P-router = B, Q-router = C; via A}
The source router S deletes intermediate nodes C-G from both the exit node list and the candidate node list. Because both lists are now empty, the process ends with only one Q- space computation being performed as opposed to six for the naive order.
If H is“protected” instead of link S-H, then backup paths are computed assuming that H itself has failed. In this case candidate node list is initialized to the set of H’s neighbors, i.e., the set {F, G}. After performing a Q-space computation for F, nodes D and C are identified as intermediate exit nodes and inherit the backup path computed for F. Nodes D and C are then deleted from the exit node list. Backup paths are still needed for G and E, so the source router S selects G from the candidate node list and performs a second Q-space computation for G. After performing a Q-space computation for G, node E is identified as intermediate exit node and inherits the backup path computed for G. This process results in two Q-space computations versus five in the naive order.
Figure 5 illustrates an exemplary method 100 implemented by a source router S according to one exemplary embodiment. The method 100 is used to compute backup paths for fast re-routing in the event of a link failure or node failure. The source router S initially determines a set of affected destinations in a new network topology based on an assumed failure of a protected link or protected node in an initial network topology (block 110). The affected destinations comprise the set of destinations where NextHop is changed. The source router S determines a set of exit nodes in the new network topology associated with the affected destinations (block 120). The set of exit nodes are identified by LastHop in the initial routing table. The source router S then iteratively computes, in a breadth-first order relative to a Q-space rooted at a node incident to the failed link or at the protected node, backup path for affected destinations associated with primary exit nodes in the set of exit nodes while skipping backup path computations for intermediate exit nodes in the set of exit nodes (block 130).
Figure 6 illustrates one iteration in the backup path computations performed at block 130 in Figure 5. The source router S computes a Q-space for a selected one of the primary exit nodes (block 140). The source router S then determines a release node for the selected exit node (block 150). Finally, the source router S computes tunnel routing segments from the source node to the release node (block 160).
In some iterations, one or more intermediate exit nodes may exist on the backup path from the release node and the primary exit node. The source router S identifies one or more intermediate exit nodes, if any, on a path from the release node to a primary exit node in the current iteration (block 170). The source router S assigns the backup path for the affected destinations connected to a current primary exit node to the one or more affected destinations associated with the intermediate exit nodes (block 180).
Figure 7 illustrates a method 200 for computing tunnel routing segments. The extended P-space of the source router S is determined and the P-node is identified (step 210). The extended P-space of the source router S is intersected with the Q- space of an exit node to determine whether a PQ-node exists (block 220). If so, and the source router S computes a tunnel from the source router S to the PQ-node (block 230). In this case, the PQ node is the release node and only one tunnel is required so the process ends (block 260). If the P-space and Q-space do not intersect so that no PQ-node exists, the source router S computes a tunnel from the source router S to the P-node (block 240). The source router S then computes a second tunnel from the P-node to the Q-node (block 250). In this case, the Q-node is the release node. The computed tunnels are installed as a backup for the destination associated with the exit node.
Figure 8 illustrates an exemplary method 300 for determining the set of affected destinations at block 210 in Figure 5. The source router S computes an initial routing table based on an initial network topology (block 310). The initial routing table includes a NextHop for each destination. The source router S also computes a new routing table based on a new network topology resulting from an assumed failure of a protected link or protected node (block 320). The new routing table includes a new NextHop for each destination. The source router S determines the set of affected destinations by comparing the NextHop and new NextHop for each destination (block 330). The affected destinations comprise those destinations where the NextHop is changed.
Figures 9 illustrate another method 400 performed by the source router S for computing backup paths according to the TI-LFA criterion. The source router S determines a set of exit nodes associated with affected destinations as previously described (block 410). After defining the set of exit nodes for the affected destinations, the source router S begins the backup path computations (block 420-460). As previously noted, the source router S iterates through the exit nodes associated with the affected destination S in a breath-first order relative to a subtree rooted at a node incident to the failed link or at the protected node. The source router S calculates a backup path for each primary exit node while skipping backup path calculations for intermediate exit nodes. In the first iteration of the backup path computations, the source router S selects, in a breath-first order, a first one of the primary exit nodes in the set of exit nodes (block 420). The source router S then computes the backup path for the affected destination associated with the selected exit node (block 430). The computation performed at block 430 involves a Q-space computation as previously described. Next, the source router S determines whether any intermediate exit nodes in the set of exit nodes are present on the just computer backup path from the release node to the exit node (block 440). If so, the source router S assigns the computed backup path for the selected exit node to the intermediate exit node (block 450). If not, the source router S determines whether there are any more exit nodes to process (block 460). At block 460, the source router determines whether any more exit nodes exists that have not been process (block 460). If so, processing returns to block 420 for the next iteration. Otherwise, the process ends (block 470).
During each subsequent iteration, the source router S selects, in breath-first order, the next primary exit node in the set of exit nodes (block 420). The selection of the exit nodes in the exit node list proceeds in a breadth-first order relative to a Q-space or subtree anchored at a node incident to the failed link, or at the protected node. During each iteration, the processing proceeds as shown in blocks 430-460. When all exit nodes have been processed, the process ends (block 470). Figures 10A and 10B illustrate another method 500 performed by the source router S for computing backup paths according to the TI-LFA criterion. The source router S determines a set of exit nodes associated with affected destinations as previously described (block 505). After defining the set of exit nodes for the affected destinations, the source router S begins the backup path computations (block 510-555). As previously noted, the source router S iterates through the exit nodes associated with the affected destination S in a breath-first order relative to a subtree rooted at a node incident to the failed link or at the protected node. The source router S calculates a backup path for each primary exit node while skipping backup path calculations for intermediate exit nodes. In the first iteration of the backup path computations, the source router S selects the lowest order exit node for which a backup path is needed (block 510). The selected exit node will be a primary exit node. The source router S then computes the backup path for the affected destination associated with the selected exit node (block 515). The computation performed at block 515 involves a Q-space computation as previously described. The source router S determines the release node in the Q-space of the selected exit node and computes one or more tunnel routing segments from the source router S to the release node (block 520). The source router S removes the selected exit node from the exit node list (block 530). The deletion of the selected node can be done before or after the Q-space computation at block 515. Next, the source router S determines whether any intermediate exit nodes in the set of exit nodes are present on the just computed backup path from the release node to the selected exit node (block 540). If not, the source router S determines whether there are any more exit nodes to process (block 555). If so, processing returns to block 510 for the next iteration. If not, the process ends (block 560). If intermediate exit nodes exist on the computed backup path, the source router S assigns the same backup path to the intermediate exit nodes and deletes the intermediate exit nodes from the exit node list (blocks 545, 550). The source router S determines whether there are any more exit nodes to process (block 555). If so, processing returns to block 510 for the next iteration. If not, the process ends (block 560).
Figure 11 illustrates an exemplary source router S indicated by the numeral 600. The source router S comprises a packet forwarding unit 610, a routing unit 620, and memory 630. The packet forwarding unit includes an interface 615 for receiving and forwarding packets. The packet forwarding unit includes a network interface 615 and related processing circuitry for receiving and forwarding packets. The routing unit 620 comprises processing circuitry to compute the routing tables that are used by the packet forwarding unit 610 to forward packets. The routing unit 620 is configured in one embodiment to perform the methods shown in Figures 5-9. The processing circuitry for the packet forwarding unit 610 and routing unit 620 may, for example, comprise one or more microprocessors, hardware circuits, application- specific integrated circuits (ASICs), filed programmable gate arrays (FPGAs), or a combination thereof. The packet forwarding unit 610 and routing unit 620 may share processing resources. In some embodiments, the functions of the packet forwarding unit 610 and routing unit 620 may be implemented by a single microprocessor. In other embodiments, the functions of the packet forwarding unit 610 and routing unit 620 may be implemented by different microprocessors.
Memory 630 stores routing tables 640 used by the packet forwarding unit 610 to receive and forward packets and computer programs 660 to configure the packet forwarding unit 610 and routing unit 620. The computer programs 660 may comprise a packet forwarding program executed by the packet forwarding unit 610 to receive and forward packets, and a routing program executed by the routing unit 620 to compute the backup paths as herein described. The techniques described herein reduce the number of computations needed to compute TI-LFA backup path. Reducing the number of computations will in turn reduce the amount of time and hardware resource needed to perform the backup path computations.

Claims

Claims:
1. A method 100 of fast re-routing implemented by a source router in a communication network, said method comprising:
determining (110) a set of affected destinations in a new network topology based on the assumed failure of a protected link or protected node in an initial network topology;
determining (120) a set of exit nodes in the new network topology associated with the affected destinations; and
iteratively computing (130), in a breath-first order relative to a subtree rooted at a node incident to the failed link or at the protected node, backup paths for affected destinations associated with primary exit nodes in the set of exit nodes while skipping backup path computations for intermediate exit nodes in the set of exit nodes.
2. The method (100) of any one of claims 1 wherein iteratively computing (130) backup paths for the affected destinations associated with the primary exit nodes comprises, for each iteration:
computing (140) a Q-space rooted at the primary exit node associated with the
affected destination;
determining (150) a release node in the Q-space of the primary exit node for the affected destination; and
computing (160) one or more tunnel routing segments from the source node to the release node for the affected destination.
3. The method (100) of claim 2 wherein computing (160) one or more tunnel routing segments from the source node to the release node comprises:
computing a P- space of the source router; determining a P-node in the P- space of the source router; and
computing a first tunnel routing segment from the source router to the P-node.
4. The method (100) of claim 3 wherein, for one or more affected destinations, the P- node is the same as the release node and only one tunnel routing segment is computed.
5. The method (100) of claim 3 wherein computing (160) one or more tunnel routing segments from the source node to the release node further comprises, for one or more affected destinations:
computing a second tunnel routing segment from the P-node to the release node for the affected destination.
6. The method (100) of any one of claim 1 - 5 further comprising, for one or more iterations:
identifying (170) one or more intermediate exit nodes on a path from the release node to a primary exit node in the current iteration;
assigning (180) the backup path for the affected destinations connected to a current primary node to one or more affected destinations associated with the intermediate exit nodes.
7. The method (100) of any one of claims 1 - 6 wherein determining (110, 300) a set of affected destinations based on the assumed failure of a protected link or protected node comprises:
computing (310) an initial routing table based on the initial network topology, said first routing table including a next hop for each destination;
computing (320) a new routing table based on the new network topology resulting from the assumed failure of a protected link or protected node, the second routing table including a new next hop for each destination; and determining (330) the set of affected destinations by comparing the next hop and new next hop for each destination.
8. The method (100) of claim 7 wherein:
the initial routing table further includes a last hop indicating an exit node in the initial network topology for each destination; and
the new routing table further includes a new last hop indicating an exit node in the new network topology for each destination.
9. A router (15, 600) in a packet-switched communication network, said router comprising:
a packet forwarding unit (610) configured to receive packets over the packet- switched communication network and forward the received packets toward a respective destination; and
a routing unit (620) configured to compute forwarding instructions for the packet forwarding unit, said routing unit being operative to:
determine a set of affected destinations in a new network topology based on the assumed failure of a protected link or protected node in an initial network topology;
determine a set of exit nodes in the new network topology associated with the affected destinations; and
iteratively compute, in a breath-first order relative to a subtree rooted at a node incident to the failed link or at the protected node, backup paths for affected destinations associated with primary exit nodes in the set of exit nodes while skipping backup path computations for intermediate exit nodes in the set of exit nodes.
10. The router (15, 600) of any one of claims 9 wherein the packet routing unit is configured to iteratively compute backup paths for the affected destinations associated with the primary exit nodes by, for each iteration:
computing a Q-space rooted at the primary exit node associated with the affected destination;
determining a release node in the Q-space of the primary exit node for the affected destination; and
computing one or more tunnel routing segments from the source node to the release node for the affected destination.
11. The router (15, 600) of claim 10 wherein the packet routing unit is configured to compute one or more tunnel routing segments from the source node to the release node by: computing a P- space of the source router;
determining a P-node in the P- space of the source router; and
computing a first tunnel routing segment from the source router to the P-node.
12. The router (15, 600) of claim 11 wherein the packet routing unit is configured to compute a single tunnel routing segment for one or more affected destinations where the P- node is the same as the release node.
13. The router (15, 600) of claim 11 wherein the packet routing unit is configured to compute a second tunnel routing segment from the P-node to the release node for the affected destination for one or more of the affected destination where the P-node and the release node are different.
14. The router (15, 600) of any one of claim 9 - 13 wherein the packet routing unit is further configured to, for one or more iterations:
identify one or more intermediate exit nodes on a path from the release node to a primary exit node in the current iteration; assign the backup path for the affected destinations connected to a current primary node to one or more affected destinations associated with the intermediate exit nodes.
15. The router (15, 600) of any one of claims 9 - 15 wherein the packet routing unit is configured to compute determine a set of affected destinations based on the assumed failure of a protected link or protected node by:
computing an initial routing table based on the initial network topology, said first routing table including a plurality of destinations based on a current network topology, said routing table including a next hop for each destination;
computing new routing table based on the new network topology resulting from the assumed failure of a protected link or protected node, said second routing table including a new next hop for each destination; and
determining the set of affected destinations by comparing the next hop and new next hop for each destination.
16. The router (15, 600) of claim 15 wherein:
the initial routing table further includes a last hop indicating an exit node in the initial network topology for each destination; and
the new routing table further includes a new last hop indicating an exit node in the new network topology for each destination.
17. A router (15, 600) in a packet-switched communication network configured to:
determine a set of affected destinations in a new network topology based on the assumed failure of a protected link or protected node in an initial network topology;
determine a set of exit nodes in the new network topology associated with the affected destinations; and iteratively compute, in a breath-first order relative to a Q- space rooted at a node incident to the failed link or at the protected node, backup paths for affected destinations associated with primary exit nodes in the set of exit nodes while skipping backup path computations for
intermediate exit nodes in the set of exit nodes.
18. The router (15, 600) of claim 17 configured to perform any of the methods of claims 2 8
19. A computer program product (650) comprising instructions that, when executed by at least processing circuitry in a router (15, 600) causes the router (15, 600) to perform the method of any one of claims 1 - 8.
20. A carrier containing the computer program product (650) of claim 18, wherein the carrier is one of an electronic signal, optical signal, radio signal, or computer readable storage medium.
21. A non-transitory computer-readable storage medium (650) storing a program comprising instructions, that when executed by a processing circuit in a router (15, 600), causes the router (15, 600) to perform the method of any one of claims 1 - 8.
PCT/IN2018/050743 2018-11-13 2018-11-13 Efficient method of computing backup routes WO2020100151A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
PCT/IN2018/050743 WO2020100151A1 (en) 2018-11-13 2018-11-13 Efficient method of computing backup routes
EP18940368.6A EP3881504A4 (en) 2018-11-13 2018-11-13 Efficient method of computing backup routes
US17/292,525 US11438258B2 (en) 2018-11-13 2018-11-13 Efficient method for computing backup routes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IN2018/050743 WO2020100151A1 (en) 2018-11-13 2018-11-13 Efficient method of computing backup routes

Publications (1)

Publication Number Publication Date
WO2020100151A1 true WO2020100151A1 (en) 2020-05-22

Family

ID=70732012

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2018/050743 WO2020100151A1 (en) 2018-11-13 2018-11-13 Efficient method of computing backup routes

Country Status (3)

Country Link
US (1) US11438258B2 (en)
EP (1) EP3881504A4 (en)
WO (1) WO2020100151A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113726646A (en) * 2021-08-25 2021-11-30 烽火通信科技股份有限公司 Fast protection switching method and device for segmented routing
WO2022267513A1 (en) * 2021-06-22 2022-12-29 华为技术有限公司 Method, apparatus and device for determining backup path between node devices
WO2023077895A1 (en) * 2021-11-08 2023-05-11 中兴通讯股份有限公司 Label generation method, network device and storage medium
CN116319537A (en) * 2023-03-30 2023-06-23 山西大学 Routing availability calculation method based on node sequence

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111698152B (en) * 2019-03-15 2021-09-14 华为技术有限公司 Fault protection method, node and storage medium
US11356354B2 (en) * 2020-04-21 2022-06-07 Ciena Corporation Congruent bidirectional segment routing tunnels

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7876672B2 (en) * 2006-04-10 2011-01-25 Polytechnic Institute Of New York University Determining rerouting information for single-node failure recovery in an internet protocol network
US9838246B1 (en) * 2014-09-30 2017-12-05 Juniper Networks, Inc. Micro-loop prevention using source packet routing

Family Cites Families (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2310872A1 (en) * 1999-12-22 2001-06-22 Nortel Networks Corporation Automatic protection switching using link-level redundancy supporting multi-protocol label switching
US7707307B2 (en) * 2003-01-09 2010-04-27 Cisco Technology, Inc. Method and apparatus for constructing a backup route in a data communications network
US7330440B1 (en) * 2003-05-20 2008-02-12 Cisco Technology, Inc. Method and apparatus for constructing a transition route in a data communications network
GB2421158B (en) * 2003-10-03 2007-07-11 Avici Systems Inc Rapid alternate paths for network destinations
US7554921B2 (en) * 2003-10-14 2009-06-30 Cisco Technology, Inc. Method and apparatus for generating routing information in a data communication network
US7630298B2 (en) * 2004-10-27 2009-12-08 Cisco Technology, Inc. Method and apparatus for forwarding data in a data communications network
US7512063B2 (en) * 2004-12-14 2009-03-31 Cisco Technology, Inc. Border router protection with backup tunnel stitching in a computer network
US7933197B2 (en) * 2005-02-22 2011-04-26 Cisco Technology, Inc. Method and apparatus for constructing a repair path around a non-available component in a data communications network
US7586841B2 (en) * 2005-05-31 2009-09-08 Cisco Technology, Inc. System and method for protecting against failure of a TE-LSP tail-end node
US7848224B2 (en) * 2005-07-05 2010-12-07 Cisco Technology, Inc. Method and apparatus for constructing a repair path for multicast data
US20070091794A1 (en) * 2005-10-20 2007-04-26 Clarence Filsfils Method of constructing a backup path in an autonomous system
US7697416B2 (en) * 2006-09-08 2010-04-13 Cisco Technolgy, Inc. Constructing a repair path in the event of non-availability of a routing domain
US7738365B2 (en) * 2006-11-02 2010-06-15 Polytechnic Institute Of New York University Determining rerouting information for double-link failure recovery in an internet protocol network
IL179026A (en) * 2006-11-02 2011-04-28 Eci Telecom Ltd Method for finding protected path in mesh networks
US8264955B2 (en) * 2009-06-12 2012-09-11 Polytechnic Institute Of New York University Internet protocol fast reroute for shared risk link group failure recovery
US8848519B2 (en) * 2011-02-28 2014-09-30 Telefonaktiebolaget L M Ericsson (Publ) MPLS fast re-route using LDP (LDP-FRR)
US8934335B2 (en) * 2011-08-30 2015-01-13 Verizon Patent And Licensing Inc. System and method for enhancing loop free alternative coverage
US9350641B2 (en) * 2011-11-01 2016-05-24 Alcatel Lucent IP fast reroute scheme offering full protection
US8861340B1 (en) * 2012-03-12 2014-10-14 Juniper Networks, Inc. Fast reroute using maximally redundant trees
US9571387B1 (en) * 2012-03-12 2017-02-14 Juniper Networks, Inc. Forwarding using maximally redundant trees
US9100328B1 (en) * 2012-03-12 2015-08-04 Juniper Networks, Inc. Forwarding mechanisms for fast reroute using maximally redundant trees
US9413638B2 (en) * 2012-05-09 2016-08-09 Cisco Technology, Inc. Generating a loop-free routing topology based on merging buttressing arcs into routing arcs
US9065750B2 (en) * 2012-06-15 2015-06-23 Cisco Technology, Inc. Congestion-based notification during fast reroute operations in stateful path computation element environments
US9338086B2 (en) * 2012-09-14 2016-05-10 Cisco Technology, Inc. Hierarchal label distribution and route installation in a loop-free routing topology using routing arcs at multiple hierarchal levels for ring topologies
US9112788B2 (en) * 2012-10-10 2015-08-18 Cisco Technology, Inc. Bicasting using non-congruent paths in a loop-free routing topology having routing arcs
US9264243B2 (en) * 2013-02-19 2016-02-16 Cisco Technology, Inc. Flooding and multicasting in a loop-free routing topology using routing arcs
US20150016242A1 (en) * 2013-07-12 2015-01-15 Telefonaktiebolaget L M Ericsson (Publ) Method and Apparatus for Optimized LFA Computations by Pruning Neighbor Shortest Path Trees
US9485135B1 (en) * 2013-09-30 2016-11-01 Juniper Network, Inc. Node-protection and path attribute collection with remote loop free alternates
US9253084B2 (en) * 2014-02-24 2016-02-02 Juniper Networks, Inc. Neighbor-label distribution with label distribution protocol
US9479424B2 (en) * 2014-03-18 2016-10-25 Telefonaktiebolaget Lm Ericsson (Publ) Optimized approach to IS-IS LFA computation with parallel links
US10075367B2 (en) * 2014-04-04 2018-09-11 Telefonaktiebolaget Lm Ericsson (Publ) Apparatus and method for establishing a repair path
US9225629B2 (en) * 2014-05-30 2015-12-29 Telefonaktiebolaget L M Ericsson (Publ) Efficient identification of node protection remote LFA target
US9485173B2 (en) * 2014-06-13 2016-11-01 Telefonaktiebolaget L M Ericsson (Publ) Optimization to expand IS-IS leaf nodes during LFA computation
US9401858B2 (en) * 2014-06-30 2016-07-26 Cisco Technology, Inc. Loop avoidance during network convergence in switched networks
US9444676B2 (en) * 2014-09-08 2016-09-13 Telefonaktiebolaget L M Ericsson (Publ) Efficient identification of Q-space in remote LFA
US9998361B2 (en) * 2015-09-30 2018-06-12 Juniper Networks, Inc. MLDP multicast only fast re-route over remote loop-free alternate backup path
US9860110B2 (en) * 2015-09-30 2018-01-02 Juniper Networks, Inc. Multicast only fast re-route over remote loop-free alternate backup path

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7876672B2 (en) * 2006-04-10 2011-01-25 Polytechnic Institute Of New York University Determining rerouting information for single-node failure recovery in an internet protocol network
US9838246B1 (en) * 2014-09-30 2017-12-05 Juniper Networks, Inc. Micro-loop prevention using source packet routing

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HO, KIN-HON ET AL.: "Optimizing Post-Failure Network Performance for IP Fast Reroute using Tunnels", PROCEEDINGS OF THE 5TH INTERNATIONAL ICST CONFERENCE ON HETEROGENEOUS NETWORKING FOR QUALITY, RELIABILITY, SECURITY AND ROBUSTNESS, 28 July 2008 (2008-07-28), XP055707630, DOI: 10.4108/ICST.QSHINE2008.3950 *
See also references of EP3881504A4 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022267513A1 (en) * 2021-06-22 2022-12-29 华为技术有限公司 Method, apparatus and device for determining backup path between node devices
CN113726646A (en) * 2021-08-25 2021-11-30 烽火通信科技股份有限公司 Fast protection switching method and device for segmented routing
CN113726646B (en) * 2021-08-25 2022-10-18 烽火通信科技股份有限公司 Fast protection switching method and device for segmented routing
WO2023077895A1 (en) * 2021-11-08 2023-05-11 中兴通讯股份有限公司 Label generation method, network device and storage medium
CN116319537A (en) * 2023-03-30 2023-06-23 山西大学 Routing availability calculation method based on node sequence
CN116319537B (en) * 2023-03-30 2024-04-12 山西大学 Routing availability calculation method based on node sequence

Also Published As

Publication number Publication date
US20210399979A1 (en) 2021-12-23
EP3881504A1 (en) 2021-09-22
US11438258B2 (en) 2022-09-06
EP3881504A4 (en) 2021-12-01

Similar Documents

Publication Publication Date Title
US11438258B2 (en) Efficient method for computing backup routes
KR102397232B1 (en) Methods and nodes for sending packets in a network
US9853854B1 (en) Node-protection and path attribute collection with remote loop free alternates
US7986640B2 (en) Technique for efficiently determining acceptable link-based loop free alternates in a computer network
US7813265B2 (en) Backup BGP paths for non-multipath BGP fast convergence
US8055791B2 (en) Protecting connection traffic using filters
US10462045B1 (en) Topology independent fast reroute for node and SRLG local protection
US8358576B2 (en) Techniques for determining local repair paths using CSPF
CN110535763B (en) Route backup method, device, server and readable storage medium
US9832121B1 (en) Next hop instruction associations for forwarding unit programming within a network device
US8711676B2 (en) Techniques for determining optimized local repair paths
US11546252B2 (en) Fast flooding topology protection
Papán et al. Analysis of existing IP Fast Reroute mechanisms
US20210399974A1 (en) Delay-Based Micro-Loop Prevention in IGP Routing
Liu et al. A fast rerouting scheme for OSPF/IS-IS networks
US7702810B1 (en) Detecting a label-switched path outage using adjacency information
Kamamura et al. Autonomous IP fast rerouting with compressed backup flow entries using OpenFlow
Suzuki An Efficient Calculation for TI-LFA Rerouting Path
US9143399B2 (en) Minimizing the number of not-via addresses
CN111935001B (en) Path switching method, node and system
US12107755B2 (en) Method and a device for routing traffic along an IGP shortcut path
CN109729006B (en) Message processing method and device and computer readable storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18940368

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2018940368

Country of ref document: EP

Effective date: 20210614