skip to main content
10.1145/863955.863962acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free Access

Routing using potentials: a dynamic traffic-aware routing algorithm

Published:25 August 2003Publication History

ABSTRACT

We present a routing paradigm called PBR that utilizes steepest gradient search methods to route data packets. More specifically, the PBR paradigm assigns scalar potentials to network elements and forwards packets in the direction of maximum positive force. We show that the family of PBR schemes are loop free and that the standard shortest path routing algorithms are a special case of the PBR paradigm. We then show how to design a potential function that accounts for traffic conditions at a node. The resulting routing algorithm routes around congested areas while preserving the key desirable properties of IP routing mechanisms including hop-by-hop routing, local route computations and statistical multiplexing. Our simulations using the ns simulator indicate that the traffic aware routing algorithm shows significant improvements in end-to-end delay and jitter when compared to standard shortest path routing algorithms. The simulations also indicate that our algorithm does not incur too much control overheads and is fairly stable even when traffic conditions are dynamic.

References

  1. R. Ahuja, T. Magnanti, and J. Orlin. Network Flows: Theory, Algorithms, and Applications. Prentice Hall, Englewood Cliffs, NJ, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Andersen, H. Balakrishnan, M. F. Kaashoek, and R. Morris. Resilient Overlay Networks. In Proceedings of the 18th ACM Symposium on Operating System Principles, pages 131--145, Chateau Lake Louise, Banff, Canada, October 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E. J. Anderson, T. E. Anderson, S. D. Gribble, A. R. Karlin, and S. Savage. A Quantitative Evaluation of Traffic-Aware Routing Strategies. ACM SIGCOMM Computer Communication Review, 32(1):67--67, January 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. L. Barabási and R. Albert. Emergence of Scaling in Random Networks. Science, 286:509--512, 1999.Google ScholarGoogle Scholar
  5. D. Bertsekas and R. Gallager. Second Derivative Algorithm for Minimum Delay Distributed Routing in Networks. IEEE Transactions on Communications, 32(8):911--919, 1984.Google ScholarGoogle ScholarCross RefCross Ref
  6. K. Binder and D. W. Heermann. Monte Carlo Simulation in Statistical Physics. Springer Verlag, Berlin, Germany, 4th edition, August 2002.Google ScholarGoogle Scholar
  7. E. W. Dijkstra. A Note on Two Problems in Connexion with Graphs. Numerische Mathematik, 1:269--271, 1959.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. B. Faverjon and P. Tournassoud. A Local Based Approach for Path Planning of Manipulators with a High Number of Degrees of Freedom. In Proceedings of IEEE International Conference on Robotics and Automation, pages 1152--1159, March 1987.Google ScholarGoogle Scholar
  9. L. K. Fleischer. Approximating Fractional Multicommodity Flow Independent of the Number of Commodities. In Proceedings of the 40th Annual Symposium on Foundations of Computer Science, pages 24--31, New York, NY, October 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. Fortz and M. Thorup. Internet Traffic Engineering by Optimizing OSPF Weights. In Proceedings of Infocom '00, pages 519--528, Tel Aviv, Israel, March 2000.Google ScholarGoogle ScholarCross RefCross Ref
  11. N. Garg and J. Konemann. Faster and Simpler Algorithms for Multicommodity Flow and Other Fractional Packing Problems. In Proceedings of the 39th Annual Symposium on Foundations of Computer Science, pages 300--309, Palo Alto, CA, November 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. V. Guruswami, S. Khanna, R. Rajaraman, F. B. Shepherd, and M. Yannakakis. Near-Optimal Hardness Results and Approximation Algorithms for Edge-Disjoint Paths and Related Problems. In Proceedings of the 31st ACM Symposium on Theory of Computing, pages 19--28, Atlanta, GA, May 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Herzog. RSVP Extensions for Policy Control. RFC 2750, IETF, January 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. D. Jackson. Classical Electrodynamics. John Wiley & Sons, New York, NY, 3rd edition, August 1998.Google ScholarGoogle Scholar
  15. O. Khatib and J. F. Le Maitre. Dynamic Control of Manipulators Operating in A Complex Environment. In Proceedings of the 3rd CISM-IFToMM, Udine, Italy, 1978.Google ScholarGoogle Scholar
  16. H. Kobayashi and M. Gerla. Optimal Routing in Closed Queuing Networks. ACM Transactions on Computer Systems, 1(4):294--310, November 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. E. Kreyszig. Advanced Engineering Mathematics. John Wiley & Sons, New York, NY, 8th edition, December 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Medina, A. Lakhina, I. Matta, and J. Byers. BRITE: An approach to Universal Topology Generation. In Proceedings of the International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunications Systems, Cincinnati, OH, August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Moy. OSPF Version 2. RFC 2328, IETF, April 1998.Google ScholarGoogle Scholar
  20. The Network Simulator --- ns-2. http://www.isi.edu/nsnam/ns/.Google ScholarGoogle Scholar
  21. V. Paxson and S. Floyd. Wide Area Traffic: The Failure of Poisson Modeling. IEEE/ACM Transactions on Networking, 3(3):226--244, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. W. H. Press, B. P. Flannery, S. A. Teukolsky, and W. T. Vetterling. Numerical Recipes in C. Cambridge University Press, Cambridge, UK, 2nd edition, January 1993.Google ScholarGoogle Scholar
  23. R. L. Rardin. Optimizations in Operations Research. Prentice Hall, Upper Saddle River, NJ, 1998.Google ScholarGoogle Scholar
  24. A. Shaikh, J. Rexford, and K. G. Shin. Load-Sensitive Routing of Long-Lived IP Flows. In Proceedings of SIGCOMM '99, pages 215--226, Boston, MA, August--September 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. W. R. Stevens. TCP/IP Illustrated, volume 1. Addison-Wesley, Boston, MA, January 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. L. Tassiulas and A. Ephremides. Stability Properties of Constrained Queueing Systems and Scheduling Policies for Maximum Throughput in Multihop Networks. IEEE Transactions on Automatic Control, 37(12):1936--1948, December 1992.Google ScholarGoogle ScholarCross RefCross Ref
  27. S. Vutukury and J. J. Garcia-Luna-Aceves. A Simple Approximation to Minimum Delay Routing. In Proceedings of SIGCOMM '99, pages 227--238, Boston, MA, August--September 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Z. Wang and J. Crowcroft. Shortest Path First with Emergency Exits. In Proceedings of SIGCOMM '90, pages 166--176, Philadelphia, PA, August 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. B. Waxman. Routing of Multipoint Connections. IEEE Journal on Selected Areas in Communications, 6(9):1617--1622, December 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. P. H. Winston. Artificial Intelligence. Addison Wesley, Boston, MA, 3rd edition, January 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Routing using potentials: a dynamic traffic-aware routing algorithm

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
      August 2003
      432 pages
      ISBN:1581137354
      DOI:10.1145/863955

      Copyright © 2003 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 August 2003

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      SIGCOMM '03 Paper Acceptance Rate34of319submissions,11%Overall Acceptance Rate554of3,547submissions,16%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader