Вы находитесь на странице: 1из 6

Traffic Engineering in Enterprise Ethernet with Multiple Spanning Tree

Regions

M. Padmaraj, S. Nair, M. Marchetti G. Chiruvolu, M. Ali


HACNet Labs, Southern Methodist University R&I Alcatel USA,
Dallas, Texas, USA Plano, Texas, USA

Abstract traffic engineering of Ethernet. MSTP provides


IEEE 802.1S multiple spanning tree protocol alternate paths between two nodes within an
(MSTP) is part of a family of standards for local and administrative region such that basic traffic
metropolitan area networks based on Ethernet engineering can be enabled. This standard provides
protocol. MSTP allows a set of regions to be defined guidelines to better resource utilization, localization of
whose logical union spans the entire network, which in failures and faster recovery.
turn defines the association between VLANs and MSTP uses multiple spanning trees (MST) and
Spanning Tree Instances. In this paper we propose an virtual LANs (VLAN) [4] are mapped onto these trees.
algorithmic approach for constructing multiple 802.1q specifies a method for tagging (with Q-tags)
spanning tree regions in the enterprise network Ethernet frames with VLAN membership. This VLAN
domain which will provide better convergence time, tag or ID (VID) is a 12 bit field, which identifies the
reusability of VLAN tags, protection from failures, and VLANs to which a frame belongs in a shared network
optimal broadcast domain size. [7]. The enterprise may run out of VIDs and this is a
scalability issue. Determining a proper mapping
between VLANs and STs is another issue. In order to
1. Introduction address these problems MSTP proposes MST regions,
which provides mapping between VLANs and STs.
Ethernet protocol relies on IEEE 802.1d spanning These are physical sub-networks where switches with
tree protocol (STP) [1] to provide loop-free similar properties form a region. With this kind of
connectivity across various network nodes with a region formation, a VLAN is restricted to a physical
single tree. Any failure in the tree will cause a region, making it difficult to support virtual and
reconstruction of the spanning tree (ST), disrupting dynamic nature of VLANs.
traffic flowing in the entire network, and the process In this paper we propose an algorithmic approach
will take up to 60 seconds [10]. Time critical to effectively divide the network domain into smaller
applications in enterprise networks require a MST regions and hence achieve faster recovery,
reconfiguration time less than few tens of milliseconds. localize failures and provide protection within the
Further, STP uses a single ST to carry the whole region. Our approach uses VLANs not switches as the
network traffic, resulting in congestion and resource base of region formation. This method is flexible and
underutilization. supports dynamic VLAN registration and removal.
To improve upon reconstruction time 802.1w [2] The rest of the paper is organized as follows.
standardized its Rapid Spanning Tree Protocol (RSTP). Background work is described in the next section.
Although RSTP reconstructs the tree in less than a Section 3 proposes an algorithmic approach to region
seconds, does no load sharing and problems similar to construction. Section 4 presents some experimental
STP still exists. results showing the performance of our approach.
If the IEEE 802.1d Ethernet switches were Finally section 5 concludes the paper with
deployed at the core of a Metro domain, the core summarizing the work and future directions.
switches would have to learn thousands of MAC
addresses. This may result in huge MAC address 2. Background work
tables that have to be maintained by the core Metro
switches leading to MAC address table explosion. A Collection of MSTs in a VLAN-aware network
IEEE standardized 802.1s Multiple Spanning Tree is defined as a Spanning Forest (SF). The SF allows
Protocol (MSTP) [3] to deal with problems related to the utilization of all links that would otherwise be

Proceedings of the 2005 Systems Communications (ICW’05)


0-7695-2422-2/05 $20.00 © 2005 IEEE
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY HAMIRPUR. Downloaded on July 29,2010 at 08:55:54 UTC from IEEE Xplore. Restrictions apply.
idled by the standard spanning tree and thereby where tags can be repeated in regions. However,
eliminating the wastage of bandwidth. However, the practical studies indicate that present switches can
complexity of management increases with the number handle only up to approximately 3500 VLANs in
of STs and the switches must maintain port state acceptable amount of switching time. Splitting the
information for each ST of the SF and the set of network to regions can help keep the number of
VLANs mapped on to them. VLANs in a region to a much lesser number, thereby
The MSTP solved the problem of mapping giving a performance boost.
multiple VLANs to a single ST. However, the problem In MST regions a switch belongs to only one
of determining what VLAN is to be associated with region in the network. However, VLANs are not
which ST instance needs to be addressed. The IEEE restricted to a particular physical location like simple
802.1s committee proposed a solution by introducing LANs. End systems can be added, deleted or moved
MST regions. A region can be thought of as an from VLAN making it dynamic. Having switches
equivalent of Border Gateway Protocol (BGP) belong to predefined regions will not guarantee that
Autonomous Systems, which is a group of switches VLANs will also follow the same rule of region
placed under a common administration [8]. Within a membership. Since VLANs do not belong to any
region one or more MSTs can be defined. MSTP physical location, with the current configuration, there
ensures that the frames of a given VLAN are assigned is a high probability that they will span across multiple
to one and only one of the ST instances within a regions.
region. A fault tolerant MSTP is proposed in Viking [10].
The MSTP should be able to identify the The Viking system provides at least two switching
boundaries of regions to ensure a consistent VLAN to paths between any pair of end-nodes in two different
ST instance mapping [8]. For this, the characteristics STs. Viking relies on per-VLAN-ST implementation
of regions are included in the bridge protocol data of Cisco where there is a separate ST running on every
units (BPDU). For detecting the boundary of a region, switch for every VLAN. This has the limitation on the
the switches that are members of a region need to number of VLANs the metro Ethernet can support due
know only the region(s) to which the neighboring to the maximum VLAN tag size and the number of
switch belongs. A switch uses the region information STs a switch can support.
for creating the VLAN-to-ST instance digest. When We have proposed an optimal multiple spanning
the other switch receives the BPDU, it attempts to tree construction algorithm for Metro Ethernet in [5],
extract the information from the digest, using its own which is an iterative approach using traffic demand
region information as key. Once extracted, the switch and dynamic link weight characteristics to fine tune
compares the extracted VLAN-to-ST instance table the initial ST to ensure that the resulting tree will
with its own table. If they are different the switch satisfy the demand requirements and offer the best
belongs to different regions. possible performance. Further in [2], we proposed a
A set of carefully engineered regions can increase novel scheme for congestion control in Ethernet which
the performance of entire enterprise network. To is highly scalable and robust. These can easily be
achieve the best possible engineering of regions, the combined with our new proposal to provide uniform
goals behind the construction of region needs to be resource utilization with failure localization and faster
stated. Splitting the entire network to multiple regions recovery.
essentially splits the traffic from the nodes and thus
prevents unnecessary broadcast traffic flowing through 3. Region algorithm
the network. Attaining faster recovery in a smaller
region is much easier, than trying to attain the same in In our approach members of different VLANs can
the entire network domain. Also faults can be be attached to a switch, and thus the switch itself may
localized to avoid network-wide failure. Having STs in be part of multiple regions. When switches participate
a very large domain, attaining protection can become in several regions, links attached to these switches
fairly challenging. When we deal with smaller regions, may also act as members of more than one region.
guaranteeing at least 2-connectivity (to avoid single This technique is very flexible and scalable; switches
failure) becomes much easier, when compared to a can be added or removed from a region based on the
guarantee like this for the entire network. membership of a VLAN in the region. For example,
While usage of VLANs is a well understood fact adding a new member to a VLAN ‘v’ involves adding
in Ethernet, their usage is limited to a maximum 4096 this member to a switch. If this switch is not part of
because it depends on the 12 bit VLAN ID. However, the region where v has its membership, add this new
in large enterprises, just 4096 VLANs will not be switch to the region. However, the method we use to
sufficient. MST Regions can be used as a solution

Proceedings of the 2005 Systems Communications (ICW’05)


0-7695-2422-2/05 $20.00 © 2005 IEEE
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY HAMIRPUR. Downloaded on July 29,2010 at 08:55:54 UTC from IEEE Xplore. Restrictions apply.
construct the region should meet the following could be the size of VLAN or the VLAN nodes are too
requirements: sparse. We call these VLANs ‘blocked VLAN’. Based
1. Provisioning protection. on the availability of VLAN tags we either leave it as
2. Guaranteed minimum 2-connectivity. regions representing single VLANs or group them
3. Faster recovery from failures. together to form one region to represent all blocked
4. Size of the region vs. performance. VLANs.
5. Optimal broadcast domain size ƒ Start a new region Rk. Region has three parameters, list of
6. Reusability of VLAN tags. VLANs, list of nodes and maximum region size ‘z’.
ƒ Pick a VLAN to start with and add VLAN ‘Vt’ to region’s
Protection from single failures can be achieved by VLAN list.
guaranteeing at least 2-connectivity within the region, ƒ Construct a 2-connected region from the given VLAN nodes.
thus, the first and second goals are closely related. ƒ Expand the region by adding more VLANs and external nodes
Broadcast domain size depends on the size of the up to a maximum size of ‘z’ nodes.
ƒ Continue constructing regions until there are no more VLANs
domain and diameter. Faster recovery can be achieved left.
if the region is small. Therefore third, fourth and fifth Figure 1. Algorithm overview
goals are closely related. However, having too many
small regions in the network can result in more control Before describing the algorithm we introduce
messages and will kill the purpose of a region. Hence some of the terms (procedures) used in the
we need to come up with an optimal size for the region, algorithmsuch as ‘VLAN-Region share list’, ‘Tagging’,
which should consider number of nodes and diameter. ‘Voting’, ‘Ensuring 2-connectivity’, and ‘Coarsening’.
Definition1: Consider network as a graph G (N, E),
where N is the set of nodes and E is the set of links. 3.1. Terminologies
The problem is to divide the graph into regions R1,
R2…. Rk such that |Ri| ” z and VLAN vi İ Rm & vi ӈ 3.1.1. VLAN-Region share list (VR list). VR list
Rn. Also if ni İ N it is possible that ni İ Rm and ni İ Rn, gives the percentage of nodes (switch) shared between
and there can be link ei İ E, ei İ Rm and ei İ Rn. a VLAN i and a specific region Rk. This list will be
This problem can be formulated as a graph initialized with zeros and updated as we partition the
partition algorithm. However, the specific feature network. This list will help in choosing candidate
about this partition is that a node (switch) or link can VLANs for a region. If there is a 100% sharing of
be part of multiple partitions. One simple solution can nodes between a VLAN and region, then that VLAN
be to look at all possible VLAN combinations and must be included in the region. Otherwise, the
then pick the best regions satisfying our goals. Though inclusion of a VLAN will be based on criteria
this operation is performed offline, this technique will specified in the algorithm.
generate an exponentially large number of Table 1. Sample VLAN-Region share list (VR list)
combinations. Therefore, an algorithm which is not VLAN1 100%
VLAN2 60%
exponential, and at the same time, produces a nearly VLAN2 70%
optimal solution is required. ----- -----

We use a voting technique with node adjacencies


3.1.2. Tagging. This process is used to identify how
to find members of the region. Also we make the
distant a node is from a region. A lower tag means the
assumption that every node in the network has a
node is closer to the region. To start with, all the nodes
minimum degree of 2.
in the network which belong to the region are assigned
Definition2: The vertex connectivity of a graph G =
a tag 1. Now for each node with tag 1, find all adjacent
(N,E) in terms of its pair-wise vertex connectivity is,
non–tagged nodes and assign the tag 2. Continue this
VC (G) = min {VC(G, u, v)}, edge (u, v) is not in
process to tag all the nodes in the network. Steps
E(G).
involved in tagging are given in Fig 2.
An overview of the algorithm is given in Fig1.
To avoid inconsistency we never tag nodes which
This algorithm is divided into two major sections, ‘2-
are already tagged. For example, consider a node ‘N’
Connected Region Formation’ and ‘Region
with tag 3. While tagging N’s neighbors with tag 4,
Expansion’. Algorithm starts with a random VLAN Vt
avoid all nodes which are already tagged 4 or less
and assumes this as a region. Next step is to make this
(there will not be a node with tag grater than 4 because
region 2-connected by adding additional nodes. If the
the current highest tag value is 4). During the course
region can still accommodate more nodes, add another
of the algorithm more nodes will be added to the
VLAN and continue this process. Continue generating
region and these new nodes will get a tag 1. This will
regions until there are no more VLANs left.
result in retagging other nodes in the network. An
When considering smaller regions some VLANS
example graph with tags is given in Fig 3.
may not fit in any available regions. The problem

Proceedings of the 2005 Systems Communications (ICW’05)


0-7695-2422-2/05 $20.00 © 2005 IEEE
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY HAMIRPUR. Downloaded on July 29,2010 at 08:55:54 UTC from IEEE Xplore. Restrictions apply.
x Assign tag 1 to all nodes part of the region. sub-graph from the network with all given region
x For each nodes with tag n nodes. This involves adding some additional nodes
ƒ Find all non tagged neighbors and assign tag n+1
ƒ Next tag n = n+1
into the region to make it 2-connected. We call these
ƒ Repeat this until all nodes in the network are tagged. nodes ‘bridge-nodes’ (these nodes act as bridges
between region nodes).
Figure 2. Tagging The problem of finding minimum k-edge
3.1.3. Voting. Voting is used to identify how densely connected and k-vertex connected sub-graphs in a
a node is connected to the region. All nodes in the given graph is an NP-hard problem. There are several
network will get a chance to vote its neighbors. algorithms with different approximation factors. Since
However, a vote is only assigned to nodes which are the problem is NP-hard, many of these approaches are
not part of the current region. A node with tag k can very complex. Even though our goal is to minimize the
give a vote of 1/k to all its neighbors. Nodes with tag number of bridge-nodes in the region, having extra
value 1 will give a vote 1 to all its immediate nodes will not hurt the performance of the region or
neighbors, clearly stating that these nodes are adjacent any of our goals. Additional bridge-nodes in the region
to the region. Fig 3 plots a graph with tags and votes. provides more resources. Since nodes are shared
between regions, there is no wastage of resources and
these bridge-nodes will also help in selecting other
VLANs which are very close to the current region
when expanding the region size.
Our algorithm uses some concepts of Steiner Tree
construction from [11]. We use this concept because a
Steiner Tree spans a given subset of vertices with the
minimal total distance on its edges. Since the ultimate
Figure 3. Example for tagging & voting goal is to make a sub-graph not a tree, we have only
The voting using ‘1/tag’ explains how actively a used some initial steps from the algorithm to help us in
node is connected to the region and as tag values finding the smallest possible 2-connected sub-graph
increase (nodes which are far from the region) the with region nodes. The steps involved in this process
downstream nodes will get lower votes, resulting in are explained in Fig 5.
avoiding them from region expansion. For example a
node with several votes (1s) from region nodes, added 3.2. Formation of a 2-Connected Region
together to a very large number, shows that this node
is heavily connected to the region. Now take a First process in the algorithm is to form a 2-
scenario where a node is just connected to one region connected sub-graph representing the region. To start
member, with a very low overall vote, will always lose with, a randomly selected VLAN is used as the region.
out when competing with the node from previous To provide reliability, a 2-connected sub-graph is
scenario for inclusion in the region. Thus, voting with generated with current region nodes and some
tagging select nodes which are immediate neighbors additional nodes. This is where the tagging and voting
and densely connected to the region. This keeps the processes help us select non-region member nodes to
diameter of the region to an acceptable level. As make the region 2-connected. Nodes are selected
explained in the tagging section, when new nodes based on the tag and vote to ensure that they are close
become part of the region, a re-voting is required. to the region and heavily connected to other region
nodes. Fig 6 details a description of the algorithm.
3.1.4. Coarsening. This is used to reduce the size of a
graph without losing its properties. Coarsening will 3.3. Expanding the Region
help in continuing the algorithm on a simplified graph,
thus reducing the algorithm complexity. An example This process repeats twice in the algorithm, first
of coarsening is illustrated in Fig 4. while expanding the region with a new VLAN, and
second when expanding the region with nodes to
achieve better connectivity. For both the processes we
need to find ȕ, which is,
ȕ = z- |Rk| where |Rk| is the number of nodes in the
Figure 4. Coarsening region.
To add a new VLAN, value of ȕ must be at least
3.1.5. Ensuring 2-connectivity. After tagging and the number of nodes that required to be added to the
voting processes, algorithm extracts a 2-connected region so that the region can accommodate this VLAN.

Proceedings of the 2005 Systems Communications (ICW’05)


0-7695-2422-2/05 $20.00 © 2005 IEEE
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY HAMIRPUR. Downloaded on July 29,2010 at 08:55:54 UTC from IEEE Xplore. Restrictions apply.
Towards that, first scan through table1 and find a Once the region is no more expandable with
VLAN which shares the maximum number of nodes VLANs, the second expansion algorithm is applied.
with the region. Now run algorithm (Fig 5) steps 2 to 6 This step is an optional addition to the algorithm. After
to find out the number nodes to be added to make the the expansion process in the previous stage, if ȕ is still
region 2-connected with the new VLAN. If this a positive value, find some nodes which are tightly
number is at most ȕ, then add this VLAN, otherwise connected to the region, such that ȕ is near to 0 or as
backtrack to the previous condition of the region and desired. Similar to what we explained in the 2-
repeat the same process with the next shared VLAN. connectivity section, these additional nodes will
However, care must be taken when doing this process. increase performance and will not cause any resource
The region we are trying to expand is a single node wastage. A step-by-step description of the algorithm is
representing ‘n’ region nodes (this is after coarsening). given in Fig 7, which is a continuation of Fig 6.
When the 2-connected graph is constructed, all links 1. Start a new region Rk. Region has three parameters, list of
incident on the region node may incident on the same VLANs, list of nodes and maximum region size ‘z’.
node in the uncoarsened region, resulting in a cut 2. Pick a VLAN to start with and add VLAN type ‘Vt’ to
region’s VLAN list.
vertex. Though a very rare scenario, to avoid this we 3. Add nodes of VLAN to region’s node list.
do a check after the 2-connected graph is created to 4. Assign tags to all nodes in the network (details are given in
see if there is a cut vertex in the previous version of section ‘Tagging’).
the region for this new graph. If there is a cut vertex, 5. For each node in the network assign a vote to all its
neighbors (details are given in section ‘Voting).
then select a node from the set of newly added nodes, 6. Find a 2-connected sub-graph with region nodes (details are
which is tightly connected to the previous version of given in section ‘Ensuring 2-connectivity’).
the region, and find a shortest path from this node to a. Construct a minimum ST connecting all the region nodes
any node in the previous version of the region, other using tags and votes as weights.
b. Connect all the leaf nodes of the ST to get a 2-connected
than the cut vertex. graph.
1. Identify all nodes which are part of the region (let us call 7. Now all nodes in the ST belong to the region, so repeat steps
theses nodes R-nodes). 4 and 5 to reassign tags and votes.
8. Update table1 (VR list) to reflect nodes shared between the
2. Find shortest paths between every pair of R-node using region and other VLANs.
simple Dijkstra’s shortest path algorithm. The weights used
are Tag and Vote. First we will look at the smallest tag value, 9. Check table1 for VLANs sharing 100% of its nodes with the
and if there are same tag values, then the highest vote will region. If any, add to the regions VLAN list.
win. 10. Coarsen the network to one node representing the region
3. Construct a fully connected graph with all R-nodes and use (details are given in section ‘Coarsening’).
the weights of shortest paths between these nodes in the
original graph as the path cost. Figure 6. Constructing a 2-connected region
4. Construct a minimum ST in the new fully connected graph 11. If | Rk | >= z, then skip to step 15, otherwise continue with
with any random root node. next step.
5. Replace all paths in the ST with shortest paths from the 12. Find ȕ, the maximum # of nodes that can added to the
original graph. region such that if |Rk| = z.
6. Connect all leaf nodes to make the sub-graph 2-connected. 13. Find other heavily shared VLANs to include in the region,
given that the maximum number of nodes to add is ȕ (details
A. Have a list of all leaf nodes. are given in section ‘Expanding regions’).
B. Check if there are any direct edges connecting these leaf 14. Once the region is no more expandable, stop the process and
nodes in the original graph (since a ST does not contain all remove VLANs that are members of this region from the
edges connecting its nodes from the original graph, this is graph (just VLANs, not nodes).
possible). If yes, then combine all these leaf nodes (check
the coarsening section for details), remove them from the
15.If ȕ > 0 find nodes with lowest tag and most votes, add into
the region to assure more connectivity (details are given in
list of leaf nodes, and add these combined nodes into the
section ‘Expanding regions’).
list of leaf nodes. The combined node is not a leaf node
anymore; however, we will call it a leaf to continue the 16.Repeat steps 1 thru 15 until no more VLAN is left out in the
process. graph.
C. Start with one randomly selected leaf node. Figure 7. Algorithm to expand region
D. Start Dijkstra’s shortest path algorithm and continue until
another leaf node is reached. When selecting path nodes
exclude nodes which are part of the ST. 4. Simulation
E. Add nodes in the path to the region’s node list.
F. Combine all nodes in the path to one node. Simulations were performed on randomly
G. Remove these two leaf nodes from the leaf node list and generated networks to study the performance of our
add the new combined node. approach for region generation. We used the ITM tool
H. Repeat steps B to G until there is only one leaf node. from Georgia Tech to generate random networks and
Figure 5. Extracting a 2-connected sub-graph output of this tool (Sanford Graph Base format) is
converted into an adjacency matrix using our

Proceedings of the 2005 Systems Communications (ICW’05)


0-7695-2422-2/05 $20.00 © 2005 IEEE
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY HAMIRPUR. Downloaded on July 29,2010 at 08:55:54 UTC from IEEE Xplore. Restrictions apply.
algorithm. Then VLANs are generated and attached to 5. Conclusion
nodes in the network. This module takes as input the
desired number of VLANs to be generated. Once the In this paper we introduced a multiple spanning tree
network is prepared, the region-generator module region construction algorithm which provides basic
splits the network into virtual sub-networks. traffic engineering of Ethernet in the Enterprise
The simulation was tested with several networks domain. The proposed method supports dynamic
with different switch count and VLANs. The regions nature of VLANs where VLAN nodes can be added,
generated from the simulation was first tested for 2- moved, or removed without much effort. Also our
connectivity. The results proved that we can provide method provides enough resources in the region to
protection from at least one node or link failure. support protection from at least single failures.
The broadcast domain size of the region was Through a number of simulation experiments, we
tested using the diameter, which is the longest shortest concluded that this approach can be used to increase
path in the network. Longest shortest path can be the performance of the MSTP by dividing the network
calculated by all pair shortest path algorithm [9] and into regions based on VLANs. This algorithm can be
then take the longest path from this list of shortest easily extended to construct regions based on traffic
paths. The diameter is measured using the delay priorities, departments, access privileges and security
involved at the nodes and delay on links. Graph requirements.
showing different diameters for a 50 node network
with 15, 20, 25 and 30 VLANs is given in Fig 8. This
graph shows that as the region size increases, the
diameter also increases. However, this increase in
diameter is flatter when we have a large number of
VLANs in the network. Another noticeable outcome is
that as the number of VLANs increase, we get a
tighter region, meaning a better diameter. This clearly
indicates that when we have more VLANs to choose
from, the region is more optimal; hence, proving that
our approach will work well in a bigger network with
large number of nodes and VLANs. Figure 9. Blocked VLANs
15 VLANs 20 VLA Ns
6. References
25 VLANs 30 VLA Ns

2800 [1]. IEEE 802.1d, “Media access control bridges”.


Diameter (Micro sec)

2600
2400 [2]. IEEE 802.1w, “Rapid spanning tree configuration”.
2200 [3]. IEEE 802.1s, “Multiple Spanning Trees”.
2000 [4]. IEEE 802.1q, “Virtual Bridged Local Area Networks”.
1800 [5]. M. Padmaraj, S. Nair, M. Marchetti, G. Chiruvolu, M.
1600 Ali and A. Ge. “Metro Ethernet Traffic Engineering
1400
1200 Based on Optimal Multiple Spanning Trees”. Second
1000 IEEE/IFIP WOCN2005, March 2005
0 2 4 6 8 10 12 14 16 1820 22 24 26 [6]. A. Ge and G. Chiruvolu: “DiffServ-Compatible Fair
Congestion Control through Extended Pause
Region size (# of nodes)
(DiffPause) for Metro-Ethernet”, IEEE ICC, 2004.
[7]. G. Chiruvolu, A. Ge, D. Elie-Dit-Cosaque, M. Ali and J.
Figure 8. Diameter Rouyer, “Issues and approaches on extending Ethernet
beyond LANs”, IEEE Communications Magazine, vol.
Simulation result in Fig 9 shows the comparison 42, no. 3, Mar 2004, p. 80-86.
of our approach (logical regions) with physical regions [8]. CISCO SYSTEMS, “Understanding Multiple Spanning
based on number of blocked VLANs. In the physical Tree Protocol”, CISCO white paper, May 2004.
[9]. R.W. Floyd, "Algorithm 97: Shortest path",
region a switch is allowed to be part of only one
Communications of the ACM, pp.345, 1962
region. We used our algorithm to generate physical [10].S. Sharama, K. Gopalan, S. Nanda, and T. Chiueh,
regions, by iteratively creating a sub-network and then “Viking: A multi-spanning-tree Ethernet architecture
removing nodes which are part of the region from the for metropolitan area and cluster networks”, IEEE
network. Results show that there is a sharp increase in INFOCOM, March 2004.
the number of VLANs blocked with small physical [11].L. Kou, G. Markowsky and L. Berman, “A Fast
regions. Algorithm for Steiner Trees”, Acta Informatica,
Springer-Verlag, vol. 15, pp.141-145, 1981.

Proceedings of the 2005 Systems Communications (ICW’05)


0-7695-2422-2/05 $20.00 © 2005 IEEE
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY HAMIRPUR. Downloaded on July 29,2010 at 08:55:54 UTC from IEEE Xplore. Restrictions apply.

Вам также может понравиться