Elsevier

Computer Networks

Volume 41, Issue 2, 5 February 2003, Pages 247-267
Computer Networks

Combinatorial design of multi-ring networks with combined routing and flow control

https://doi.org/10.1016/S1389-1286(02)00395-XGet rights and content

Abstract

In this paper we present a novel design technique for packet switched networks. The design is based on the construction of multiple virtual rings, which enjoy the one-bridge property: the path between any two nodes is either confined to a single ring or traverses exactly two rings (passing through a single bridge node). Our best designs are constructed by using finite generalized quadrangles of combinatorial design theory. We present novel routing and flow control protocols that capitalize on the one-bridge property of the multi-ring network. Our protocols ensure that (i) no loss due to congestion occurs inside a network, under arbitrary traffic patterns; (ii) all the packets reach their destinations within bounded time with low jitter; and (iii) the bandwidth is allocated fairly and no host is starved. We provide both a theoretical analysis and an extensive simulation-based performance evaluation of our protocols.

Introduction

The ever-increasing growth of data traffic and its bandwidth demand necessitates careful design and planning of the infrastructures of next generation networks. Traditional approaches to network design either face computationally hard optimization problems or use heuristic methods with approximate answers. The complexity increase in such approaches is partially due to dependency on traffic models and estimations. In contrast, combinatorial approaches to network designs [28], [30], [31] offer deterministic bounds on the maximum route length, and on the survivability, independent of the traffic characteristics. Ensuring traffic-independent properties is particularly important for data networks where traffic is bursty and unpredictable.

As the starting point of this paper, we introduce a new class of virtual-ring network designs. These networks enjoy the one-bridge property: the path between any two nodes is either confined to a single ring or traverses exactly two rings (passing through a single bridge node). Our best designs are constructed by using finite generalized quadrangles of combinatorial design theory.

Our goal is to show which routing, flow and access control protocols are best suited to such network topologies. We consider two basic approaches. With a unified approach, the protocols are tightly coupled with the network design, so they can take full advantage of its topological properties. With a decoupled approach, the protocols are standard WAN protocols, which are oblivious to the network design. Instead, they employ shortest path routing and window-based flow/congestion control. This paper tests the two alternatives and compares their performance.

We focus on the ring topology as a basic building block for several reasons. The ring topology is well studied, and is widely used in LAN and MAN environments. Its attractive symmetry and cyclic structure allow for simple, decentralized, fair, and congestion-free control protocols. And since a ring is a minimal biconnected graph it also provides survivability with minimal cost. For example, a multi-ring topology is the backbone topology of choice in the synchronous optical network standard [1]. Surveys on other uses of multi-ring networks are [8], [16].

Recently there has been a renewed interest in ring-based networks in the context of resilient packet rings (RPR) networks [5], [23]. RPR is a new data transport technology for metropolitan area networks (MAN), to be standardized as IEEE 802.17. An RPR is a ring-based architecture that consists of two counter-rotating rings. RPR generalizes the spatial bandwidth reuse by adapting mechanisms found in buffer insertion rings.

Networks with a simple linear topology, such as a bus or a ring [2], [10], [17] are not throughput scalable. In contrast, networks with an arbitrary topology may be throughput scalable but they are typically not congestion-free. The only exception we are aware of is the MetaNet architecture [19], [20] which provides ring properties on a LAN with an arbitrary topology, by embedding a virtual ring around a spanning tree of the network. The virtual ring emulates a full-duplex ring with spatial bandwidth reuse, like the MetaRing [6], [18]. Since the ring spans every node, the maximum length of routing is O(N) for an N-node network. Thus, scaling the MetaNet with a single virtual ring to a wide area network (WAN) may not be efficient.

Combinatorial design theory was first applied to multi-ring network designs in [30], [31]. The authors showed how to use balanced incomplete block designs (BIBDs) to obtain congestion-free networks with scalable throughput. The techniques resulted in networks in which the maximum route length and the maximum degree (number of rings a node belongs to) are both bounded by O(N), where N is the number of nodes in the network. These bounds are similar to those of earlier approaches to multi-ring network design (e.g., chordal rings [22], [24] or ring-connected-ring [9]), with the additional property of congestion-free routing.

Our first contribution is the introduction of network designs with the one-bridge property. We prove a new trade-off between the node degree and the ring size for such networks. Then we introduce generalized quadrangles (GQ) and GQ-based network designs. Our GQ-based networks have a high level of path redundancy which translates to high survivability in the face of link and node failures, and allows easy load balancing among rings. And our networks require only O(N4/3) links in total, which significantly improves the O(N3/2) links of [30].

Our next contribution is a suite of new topology-aware protocols which we collectively call the VRing protocols. These protocols are tailored to virtual multi-ring networks which have the one-bridge property. Within each ring our protocols emulate a virtual slotted ring [3], [15]. Our routing and control protocols ensure that (i) the network is congestion-free, under arbitrary traffic patterns; (ii) all the packets reach their destinations within bounded time; (iii) the bandwidth is allocated fairly and no host is starved.

We evaluated the performance of our protocols by an extensive delay and throughput simulation study. We first tested the behavior of our topology-tailored VRing protocols on their own. Then, we compared the performance of VRing to an Internet-like suite of protocols which we call the INet protocols.

Our results indicate that the network access delay is substantially higher in the VRing than in the INet. However, once the packets enter the network, in the VRing they are routed with no loss, while in the INet they may be dropped and retransmitted multiple times due to congestion. Thus, our results show that the end-to-end network delay in the VRing is significantly lower than in the INet. Furthermore, we show that the variability of the network delay (and hence the jitter) in the VRing is quite small, and remains bounded even when the traffic intensity increases. In contrast, the network delay has large variability in the INet, and the variability grows rapidly with the traffic intensity. Finally, our results show that the network links are utilized more efficiently in the VRing.

We conclude that from the network provider’s perspective, the VRing provides much better network utilization, and allows the provider to give the network’s users QoS guarantees regarding available bandwidth, fairness, and jitter. Furthermore, for user applications that are more sensitive to jitter than to delay, such as audio and video transmissions, the VRing approach may be advantageous.

Organization: The rest of this paper is organized as follows. In Section 2 we describe the network design model, and introduce GQ designs. 3 The, 4 Flow control describe the VRing access control and flow control protocols. In Section 5 we analyze the VRing protocols’ properties. In Section 6 we present the results of a simulation-based performance evaluation of both the VRing and the INet. We conclude in Section 7.

Section snippets

Combinatorial construction of rings

The basic design criterion in all our multiple ring network designs is that they should obey the one-bridge property. By this we mean that a packet would need to cross at most one ring-to-ring bridge along its path from any node to any other node in the network. We shall see that this property lets us design networks with small rings (giving low propagation delay) and low degree––and at the same time admits very efficient congestion-free flow-control protocols. Formally we use the following

The VRing protocols: definitions and access control

We now start to present our topology-aware VRing protocols. The VRing protocols have two components: access control, and flow control. In this section we describe the model we use, introduce our access control protocol, and analyze its properties. The flow control protocol is described in the next section. As we shall see, the combination of the access and flow control protocols guarantees congestion-free and fair routing with bounded network delay, while using bounded internal buffers.

Flow control

The purpose of our flow control is to ensure that the network is congestion-free. Clearly packets are not dropped while they are on a single ring, so LOCAL traffic is certainly congestion-free. Therefore we need to address REMOTE traffic, and specifically we need to ensure that packets are never dropped because the buffers at a bridge overflow. We are able to do this efficiently by capitalizing on the one-bridge property––a REMOTE packet needs to cross exactly one bridge, so we need to be

Properties of the VRing routing and flow control protocols

In this section we analyze the properties of our protocols. We first show that our flow control protocol is congestion free. Then we prove that our protocols ensure a bounded network delay which is independent of the traffic pattern. Finally, we discuss the implications of the path redundancy inherent to GQ-based networks: excellent network survivability, and a simple path selection algorithm which allows easy load-balancing.

The simulation study

In order to evaluate the performance of our protocols on networks that enjoy the one-bridge property, we conducted a simulation-based study. We first tested the behavior of our topology-tailored VRing protocols on their own. Then we compared their performance to that of the generic INet protocols. We refer the reader to [25] for details of the INet protocols.

For this purpose a discrete event simulator program was written (in C++). We ran the simulator using a variety of networks and under many

Conclusions

We have described a new methodology for the design of multi-ring networks, which is based on combinatorial design theory. Our multi-ring networks have the one-bridge property: the path between any two nodes is either confined to a single ring or traverses exactly two rings (passing through a single bridge node). Such networks have been constructed using combinatorial block designs called GQs.

We presented two alternative types of routing and flow control protocols that may be used on networks

Avishai Wool received a B.Sc. (Cum Laude) in Mathematics and Computer Science from Tel Aviv University, Israel, in 1989. He received an M.Sc. and Ph.D. in Computer Science from the Weizmann Institute of Science, Israel, in 1992 and 1996, respectively. Dr. Wool then spent four years as a Member of Technical Staff at Bell Laboratories, Murray Hill, NJ, USA. In 2000 Dr. Wool co-founded Lumeta corporation, a startup company specializing in network security. Since 2002 Dr. Wool has been an Assistant

References (31)

  • C.S. Raghavendra et al.

    A survey of multi-connected loop topologies for local computer networks

    Computer Networks and ISDN Systems

    (1986)
  • American National Standard for Telecommunications, Digital Hierarchy––Optical Interface Rates and Format...
  • W. Bux et al.

    Architecture and design of a reliable token-ring network

    IEEE Journal of Selected Areas in Communications

    (1983)
  • M. Baldi, Y. Ofek, B. Yener, Adaptive real time group multicast, in: IEEE INFOCOM’97,...
  • C.J. Colbourn et al.

    The CRC Handbook of Combinatorial Designs

    (1996)
  • N. Cole, J. Hawkins, M. Green, R. Charma, K. Vasni, Resilient packet rings for metro networks, August 2001. Available...
  • I. Cidon et al.

    MetaRing––a full-duplex ring with fairness and spatial reuse

    IEEE Transactions on Communications

    (1993)
  • P.H. Dana, Global positioning system overview, The Geographer’s Craft Project, Department of Geography, The University...
  • B. Doshi et al.

    Broadband network infrastructure of the future: Roles of network design tools in technology deployment strategies

    IEEE Communications Magazine

    (1998)
  • A. De et al.

    Ring-connected-ring (RCR) topology for high-speed networking: analysis and implementation

    ACM SIGCOMM Computer Communications Review

    (1991)
  • W.D. Farmer, E.E. Newhall, An experimental distributed switching system to handle bursty computer traffic, in:...
  • R. Jain

    The Art of Computer Systems Performance Analysis

    (1991)
  • E.D. Kaplan

    Understanding GPS, Principles, Applications

    (1996)
  • S. Keshav

    An Engineering Approach to Computer Networking

    (1997)
  • C.-S. Li, Y. Ofek, A. Segall, K. Sohraby, Pseudo-isochronous cell switching in ATM networks, in: IEEE INFOCOM’94, 1994,...
  • Cited by (5)

    Avishai Wool received a B.Sc. (Cum Laude) in Mathematics and Computer Science from Tel Aviv University, Israel, in 1989. He received an M.Sc. and Ph.D. in Computer Science from the Weizmann Institute of Science, Israel, in 1992 and 1996, respectively. Dr. Wool then spent four years as a Member of Technical Staff at Bell Laboratories, Murray Hill, NJ, USA. In 2000 Dr. Wool co-founded Lumeta corporation, a startup company specializing in network security. Since 2002 Dr. Wool has been an Assistant Professor at the Department of Electrical Engineering Systems, Tel Aviv University, Israel.

    Dr. Wool is the creator of the Lumeta Firewall Analyzer. He has served on the program committee of the leading IEEE and ACM conferences on computer and network security. He is a member of the ACM and USENIX. His research interests include firewall technology, computer and network security, data communication networks, and distributed computing.

    Bülent Yener received B.S. and M.S. degrees in Industrial Engineering from the Technical University of Istanbul, Turkey, and M.S. and Ph.D.degrees in Computer Science, both from Columbia University, in 1987 and 1994, respectively. Bulent Yener is an Associate Professor of Computer Science at the Rensellaer Polytechnic Institute. Before joining to RPI, he was a Member of Technical Staff at the Bell Laboratories in Murray Hill, New Jersey. His current research interests include routing problems in wireless networks, Internet measurements, quality of service in the IP networks, and the Internet security. He has served on the Technical Program Committee of leading IEEE conferences and workshops. Dr. Yener is a member of the IEEE and serves in the editorial board of the Computer Networks Journal and the IEEE Network Magazine.

    Yueyue Song received a B.Sc. in Computer Science from Nankai University, Tianjin, P.R. China in 1995, and an M.Sc. in Computer Science from Rutgers University, New Brunswick, New Jersey in 1999.

    Parts of this paper were presented at the Globecom’99 Conference, Rio De Janeiro, 1999.

    1

    Supported in part by the Center for Discrete Mathematics and Theoretical Computer Science (DIMACS) which is funded by the National Science Foundation under contract STC-91-19999.

    View full text