Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
184 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Robust Routing Made Easy: Reinforcing Networks Against Non-Benign Faults (2307.05547v1)

Published 9 Jul 2023 in cs.DC

Abstract: With the increasing scale of communication networks, the likelihood of failures grows as well. Since these networks form a critical backbone of our digital society, it is important that they rely on robust routing algorithms which ensure connectivity despite such failures. While most modern communication networks feature robust routing mechanisms, these mechanisms are often fairly complex to design and verify, as they need to account for the effects of failures and rerouting on communication. This paper conceptualizes the design of robust routing mechanisms, with the aim to avoid such complexity. In particular, we showcase \emph{simple} and generic blackbox transformations that increase resilience of routing against independently distributed failures, which allows to simulate the routing scheme on the original network, even in the presence of non-benign node failures (henceforth called faults). This is attractive as the system specification and routing policy can simply be preserved. We present a scheme for constructing such a reinforced network, given an existing (synchronous) network and a routing scheme. We prove that this algorithm comes with small constant overheads, and only requires a minimal amount of additional node and edge resources; in fact, if the failure probability is smaller than $1/n$, the algorithm can come without any overhead at all. At the same time, it allows to tolerate a large number of independent random (node) faults, asymptotically almost surely. We complement our analytical results with simulations on different real-world topologies.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (62)
  1. In: (SODA), pp. 771–780 (2003)
  2. ACM SIGCOMM computer communication review 38(4), 63–74 (2008)
  3. In: (STOC), pp. 293–299. ACM (1990)
  4. In: Proceedings of the eighteenth ACM symposium on Operating systems principles, pp. 131–145 (2001)
  5. Algorithmica 55(1), 71–94 (2009)
  6. In: Request for Comments (RFC) 5286 (2008)
  7. IEEE micro 23(2), 22–28 (2003)
  8. In: Proc. SPAA (2003)
  9. Theoretical Computer Science (2016)
  10. Information and Computation 210, 31–39 (2012)
  11. In: IEEE TechRxiv (2020)
  12. IEEE/ACM Transactions on Networking 25(2), 1133–1146 (2016)
  13. In: Proc. ACM CoNEXT (2019)
  14. Wireless netw. 1(1), 61–81 (1995)
  15. In: (DISC), pp. 167–181. Springer (2008)
  16. In: (SPAA), pp. 284–293 (2015)
  17. In: (ESA), pp. 40:1–40:16 (2016)
  18. In: Proceedings of the 2012 ACM symposium on Principles of distributed computing, pp. 237–238 (2012)
  19. In: 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W), pp. 128–135. IEEE (2016)
  20. In: Proc. IEEE/IFIP DSN Workshop on Dependability Issues on SDN and NFV (DISN) (2016)
  21. Journal of the ACM 32(2), 374–382 (1985)
  22. In: Proc. International Symposium on Distributed Computing (DISC) (2020)
  23. In: Proc. SRDS (2019)
  24. ACM SIGCOMM Computer Communication Review 35(3), 35–44 (2005)
  25. Trans. Commun. 29(1), 11–18 (1981)
  26. In: Proceedings of the nineteenth ACM symposium on Operating systems principles, pp. 29–43 (2003)
  27. ACM SIGCOMM CCR 41, 350–361 (2011)
  28. In: 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications (2011)
  29. ACM SIGCOMM Computer Communication Review 35(5), 41–54 (2005)
  30. In: Proceedings of the ACM SIGCOMM 2009 conference on Data communication, pp. 63–74 (2009)
  31. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 11(9), 1074–1085 (1992)
  32. In: Proc. ACM SIGCOMM Workshop on Internet Measurment (2002)
  33. In: Proc. ACM CoNEXT (2018)
  34. Karger, D.R.: A randomized fully polynomial time approximation scheme for the all-terminal network reliability problem. SIAM review 43(3), 499–522 (2001)
  35. SIAM Journal on Scientific Computing 20(1), 359–392 (1998)
  36. IEEE Journal on Selected Areas in Communications 29(9), 1765–1775 (2011)
  37. Kopetz, H.: Fault containment and error detection in the time-triggered architecture. In: (ISADS), pp. 139–146 (2003)
  38. Distributed Computing 22(4), 249–267 (2010)
  39. In: Proc. ACM SIGCOMM (2007)
  40. IEEE/ACM Transactions on networking 18(6), 1895–1907 (2010)
  41. Leighton, F.T.: Introduction to parallel algorithms and architectures: Arrays· trees· hypercubes. Elsevier (2014)
  42. In: Stabilization, Safety, and Security of Distributed Systems - 19th International Symposium, SSS 2017, Boston, MA, USA, November 5-8, 2017, Proceedings, pp. 187–202 (2017)
  43. ACM Trans. Algorithms 11(3), 24:1–24:13 (2015)
  44. In: Proc. USENIX NSDI (2013)
  45. In: Proc. IEEE INFOCOM (2004)
  46. IEEE/ACM Transactions on Networking 16(4), 749–762 (2008)
  47. In: Proc. 23rd IEEE International Conference on Network Protocols (ICNP) (2015)
  48. Oran, D.: Rfc1142: Osi is-is intra-domain routing protocol (1990)
  49. In: Request for Comments (RFC) 4090 (2005)
  50. Parter, M.: Fault-tolerant logical network structures. Bulletin of the EATCS 118 (2016)
  51. Journal of the ACM 27, 228–234 (1980)
  52. Information Processing Letters 93(3), 109–115 (2005)
  53. In: Proc. ACM SIGMETRICS (2018)
  54. In: Request for Comments (RFC) 7855 (2016)
  55. Räcke, H.: Survey on oblivious routing strategies. In: (CiE), pp. 419–429. Springer (2009)
  56. Theory Comput. Syst. 49(4), 834–856 (2011)
  57. In: Proc. European Symposium on Algorithms (ESA) (2019)
  58. Scheideler, C.: How to spread adversarial nodes? rotate! In: Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, pp. 704–713 (2005)
  59. ACM SIGCOMM Computer Communication Review 32(4), 133–145 (2002)
  60. In: Proc. ACM SOSR (2016)
  61. Queue 13(8), 100–125 (2015)
  62. In: Proc. IEEE INFOCOM (2014)

Summary

We haven't generated a summary for this paper yet.