The present disclosure generally relates to computer networking. More particularly it relates to the locating of objects within a computer network, wherein an object may relate to a networking node or to a data object residing on such a networking node. It further relates to the routing and exchanging of messages between networking nodes in the communication network.
Nowadays the Internet Protocol or IP networking layer, for example IPv4 or IPv6, is based on a distinct localization and routing function. For the localization, a name of a networking node service or resource is translated into an object locator, in this case an IP address. Typically, this process, referred to as name resolution, is performed by a Domain Name System or DNS query to a name server. A DNS name server is a server that stores the DNS records for a domain name and responds with answers in the form of an IP address to queries against its database. The obtained IP address then uniquely defines the location of the networking node in the computer network, e.g., in the internet or in a local area network.
The routing function then provides the route to the location identified by the IP address where a route provides at least an indirection to the outgoing interface that the incoming message has to follow in order to reach its destination. In order to obtain the route, routing tables stored in intermediate networking nodes are used. This renders the routing function stateful where a state corresponds to the information stored locally for the networking node or router in order to take its routing decision. The routing information is however not derivable from local knowledge. Routes must thus be constructed from remote information that is obtained or learned by polling in order to relate the location as identified by the IP address to the route defining how to get to the IP address.
More generally, the name of a resource or object indicates what is sought, an address or object locator indicates where it is. Following this distinction, two generic models, i.e., the overlay model and the name-based routing model, can be identified as the main principle of most currently proposed approaches to stateful message exchange systems.
The overlay model introduces another level of indirection or overlay by extending the IP address semantic and including a location name from where the information can be retrieved
The name-based routing model performs routing based on object names performing independently from the IP addresses which contains network locator semantic. Such a scheme is for example proposed by T. Koponen et all in “A data-oriented (and beyond) network architecture” published in the Proc. of 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ACM SIGCOMM, pp. 181-192, New York, N.Y., USA and by V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard in “Networking named content”, Proceedings of CoNEXT, 2009. The notion of name-based routing predates these publications but these reflect the latest trial to overcome the limits of IP networking enabling data to become independent from their network location, application, storage support but also means of content exchanges enabling in turn in-network caching and replication.
The publication “Efficient Navigation in Scale-Free Networks Embedded in Hyperbolic Metric Spaces” by D. Krioukov et al. published in May 2008 shows that complex scale-free network topologies naturally emerge from hyperbolic metric spaces. This observation lead to the inception of “Greedy forwarding in dynamic scale-free networks embedded in hyperbolic metric spaces” by F. Papadopoulos et al., published in Proc. of 29th IEEE Conference on Computer Communications (INFOCOM), pp. 1-9, 2010 from the demonstration of the probabilistic congruence of the network topology with an underlying or hidden space presenting properties of a negatively curved space. The methods proposed in these publications rely on the construction of a virtual map obtained by applying empirical rules derived from the properties of the hidden—instead of observable—hyperbolic space underlying the observable Internet topology. The proposed methods rely on the self-similarity of clustering in real complex networks such as the Internet derived from empirical evidence that hidden metric spaces underlie the observable topology of these networks. Coordinates are built from the knowledge of the statistical properties of this underlying space.
A disadvantage of the overlay model is that is leads to unnecessary inefficiency as it operates independently of any knowledge about the structure and behaviour of the underlying network topology/routing level. The overlay model complies with the classical internet evolution model where a host identifier space is inserted in between existing object names and network locators. The decoupling resulting from the additional level of indirection between content names and network locators is particularly detrimental when a single organization owns both levels as information distribution acts independently of the underlying routing topology. When such distinction is made between host identifiers and network locators, the former IP addresses are often assigned independently of the topology which in turn prevents renumbering in case of multi-homing which accounts to about 25% of the sites connected to the Internet. This model thus exacerbates the problem generated by Provider Independent or PI addresses that are not topologically aggregetable, i.e., they are allocated independently of the topology. This in in turn makes Classless Inter-Domain Routing or CIDR ineffective in handling address scaling. Routing on PI addresses implies to store and process non-aggregetable routing table entries in the internet routing system. On the other hand, the cost incurred by these additional routing entries in terms of memory space and processing capacity is directly supported by the global routing system rather than the owner of these addresses. Assume for instance that a Provider Independent IP address would be allocated to each content name domain, which is the coarsest level of granularity one can reasonably expect, the number of active routing entries would increase from about 5.105 to 2.5 108. Moreover, the resulting increase in the routing table size in terms of number of entries and associated processing would worsen over time as the number of domains also increases from 10 to 15% per year. In summary, all elements are currently available to build the overlay model. However, the increase in router's memory and processing cost required to store and process PI entries and inefficient network resource usage in content exchange currently outweigh the potential gain.
The name based routing model suffers from limited scaling in terms of memory space, in particular the memory space required to store the routing entries in local table. This is because name spaces have not been designed to sustain routing performance and scaling. Receiver-driven schemes such as Content Centric Networking or CCN as proposed e.g. in the publication by T. Koponen et al. and the publication by V. Jacobson et al., are confronted with object name spaces that have not been designed to sustain forwarding performance and scaling. Since the information to retrieve the objects from the network has to be maintained in routing tables confer stateful routing, with one entry per top-level domain, name-based routing tables would exponentially increase making it practically unfeasible. Furthermore, the adoption of a new content name space is challenging and the maintenance of a hierarchical tree-based structure to reduce storage space and search time is even more challenging. Consequently, if names become the fundamental structure of the information exchange process, name-based routing leads to a serious scaling and performance bottleneck both in terms of memory and search time. Therefore, the resolution of a name, in particular a data object name, into an address cannot be avoided when using the name based routing model.
A disadvantage of the systems proposed by F. Papadopoulos et al D. Krioukov et al. is that the routing follows coordinates derived out of a hidden space but the routing paths do not reflect observable routing distances. As a result, localization and routing functions can only perform independently. Therefore, the derived routing paths do not reflect optimal paths and, moreover, an optimal routing path is even not guaranteed Moreover, the solution relies on the construction of a hyperbolic space using a probabilistic model from where coordinates are computed and subsequent routing computation and decisions taken. Hence, all performance metrics being it routing path stretch or success rate are also probabilistic. Consequently, the success rate is even not guaranteed to reach 100%. Summarized, the above proposed scheme is i) stateless besides the maintenance of neighbour tables, ii) probabilistic and iii) oblivious because routing states are kept unchanged and decisions invariant as long as the resulting success rate doesn't degrade below a certain threshold.
It is an object of the present disclosure to overcome the above shortcomings and provide a solution for locating and routing objects within a communication network.
According to a first aspect, this object is achieved by a networking node for exchanging messages in a communication network. The networking node comprises a message exchange module configured to exchange these messages based on object locators of objects within this communication network. An object locator further comprises geometric coordinates of a respective object in a negatively curved hyperbolic space and a distance between objects in this negatively curved hyperbolic space relate to a travel time of messages exchanged between these objects.
The networking node thus operates in a communication network by exchanging messages with other networking nodes. In order to locate an object in the communication network, each object is locatable by an object locator. An object may for example relate to a data object such as for example a file, a web page or any part thereof or more generally any digitally encoded object. An object may also relate to a networking node in the communication network which, on its turn, may exchange messages or serve data objects. By the object locator, an object is mapped in a hidden geometric space as defined by its geometric coordinates. This mapping is defined by the interrelation of objects in the communication network, more specifically by the physical property of time for messages to be exchanged.
The advantage is that, the negatively curved hyperbolic space provides a good representation of the network topology. More specifically, when the mapping is performed in the claimed way, the hyperbolic metric space is quasi-geodesic meaning that the distance function can be used to obtain the closest paths between different networking nodes. In other words, there is a direct relation between the object locators and the physical distance in time between the corresponding objects. Therefore, the routing can be directly derived from the object locators by calculating distances from the coordinates embodied by the object locators. In particular, knowing its own coordinate, a receiver of a message can compute the distance from itself to the object that sent the message by computing the distance between the respective coordinates. Moreover, the proposed operates in a statistic way instead of a probabilistic way as it relies on delay measurements between nodes.
The travel time may for example correspond to the Round Trip Time or RTT.
According to an embodiment, the message exchange module further comprises:
According to the embodiment the networking node thus operates as a client node, i.e., it retrieves data from server nodes in the communication network. The client node receives from the networking node a list of possible locations where the data is available by receiving the object locators of the data. These locations may for example comprise a root server and one or more cache servers. By calculating the distances between the client node and the object locators of the data, the client node gets a measure of the time needed to retrieve the data by each of the object locators. Moreover, the calculated distance is an indication of the time it will take to fetch the data object along the geodesic in the hyperbolic space, i.e., along the shortest path.
It is thus an advantage that a client node can derive routing information solely from local data, i.e., from the object locators themselves. The decision module may then choose to retrieve the data for which the distance to the client node is the shortest. The retrieval of the data object may then be performed by issuing a request message with the selected data object locator as destination location of the message and with the object locator of the client networking node as source location. It is a further advantage that the overall performance in terms of retrieval time is independent from the existence of cache functionality provided by intermediate routers or nodes.
According to an embodiment, the message exchange module further comprises:
Pointing refers to pointing to the locally stored information required for incoming messages to find the outgoing interface to reach the respective coordinate set. According to this embodiment, the quasi-geodesic properties of the negatively curved hyperbolic space it exploited to use the networking node as a routing node in the communication network, i.e., to propagate incoming messages towards a neighbouring node according to an optimal path. As the object locator of networking nodes and data objects are related to coordinates in the hyperbolic space, a message arriving at the routing networking node can be routed directly based on a destination object locator specified in the message. It suffices to select the logical partition within which the destination coordinates are located and to propagate the message to the neighbouring networking node providing a shortest path to this logical partition. These partitions, for example identified by their extreme points, allow summarizing a complete portion of the space without requiring enumeration of all elements belonging to this portion of the space. All of this leads to a stateful routing system instead of a stateless system as it involves aggregated states for destinations reachable indirectly via nodes sitting in a close neighbourhood.
As the hyperbolic metric space is quasi-geodesic, quasi-geodesic routing paths can be determined and, therefore, it is an advantage that a shortest route can always be determined based on the distances in the hyperbolic metric space.
Advantageously, the information required to compute routing paths are comprised within the limits of k-local geodesics.
In other words, routing information is only exchanged within a positive integer number k of hops from the networking node. Within the hyperbolic metric space the k-local geodesics actually correspond to quasi-geodesic segments. It is thus an advantage that the use of the k-local geodesics in the routing table always leads the an enumeration of quasi-geodesic segments and, thus, of a set of shortest routing paths. Furthermore, by limiting the paths locally, a trade-off can be made between the size of routing table and the derivation of the most optimal routing path which corresponds to the geodesic path. This further leads to an adaptive and cost-effective routing system as it reacts by re-executing and/or adapting routing decisions in a timely and cost-effective manner when internal or external events occur that affects the value delivery.
The routing module may be further adapted to receive updates on said segment lengths from neighbouring networking nodes and to update said routing table accordingly.
In order to maintain the routing table such that it reflects the changing conditions in the communication network, the networking node exchanges information with its neighbouring nodes. This information comprises the lengths of the segments, i.e., the distance in the hyperbolic metric space between neighbouring nodes and, thus, a travel time of messages exchanged between the neighbouring nodes.
Advantageously, the routing module is further adapted to propagate the updates within a predetermined number k of hops from a source networking node that initiated the updates.
This way, the networking node as well as the other networking nodes have information on the segment lengths of neighbouring nodes within a range of k hops. This way, it is assured that the networking node has all necessary information to update its routing table and to calculate the routing paths comprised within the limits of k-local geodesics
According to an embodiment, the message exchange module of the networking node further comprises:
This module thus determines the object locator of the networking node. This operation is realized by converting the distance between the networking node and neighbouring networking nodes into the geometric coordinates of the networking node in the hyperbolic metric space. In order to obtain the distances, messages are exchanged between the networking nodes wherein the distance information is specified. The neighbouring networking nodes thus collaborate in order to obtain the distance information.
According to a further embodiment, the object locator determining module is further configured to:
In other words, the knowledge that can be gained out of the geometric properties of the observable topology of the communication network that is characterized by a negative curvature κ yields to the above coordinate computation algorithm. It is an advantage that this algorithm is of a similar computational complexity than a corresponding canonical Vivaldi algorithm which is based on Euclidean distances when compared to the approach that would combine estimation of distance and curvature. Thus, instead of assigning coordinates and computing distances based on them, the above algorithm derives the distances between vertices from the received length, i.e., the travel times, of the corresponding geodesic drawn out of hyperbolic space and from remote coordinates derived from the selective processing and exchange of geodesics routing information, i.e., location information. This procedure leads to a major demarcation compared to the usual geometric routing where the routing topology follows the addressing space build upon global/network-wide structures. In the present case, the name space follows the topology; thus, preserving the fundamental Internet principle that the routing topology is not predetermined by the addressing space and its allocation.
According to a second aspect, the disclosure relates to a method for exchanging messages in a communication network comprising;
According to a third aspect, the disclosure relates to a computer program product comprising computer-executable instructions for performing the method according to the second aspect when the program is run on a computer.
According to a fourth aspect, the disclosure relates to a computer readable storage medium comprising the computer program product according to the third aspect.
According to a fifth aspect, the disclosure relates to a data processing system programmed for carrying out the method according to the second aspect.
According to embodiments of the present invention a locating and routing scheme is provided for exchanging messages between networking nodes within a communication network having a certain network topology. In
In order to specify the location of other networking nodes or of data objects within the communication network, the messages communicated by the message exchange module 201 comprise an object locator of the respective other networking nodes or data objects. The messages may further comprise an object locator of the networking node from which the message originates. This is analogy with existing message exchange protocols as for example the TCP/IP networking protocol or the IEEE 802.11 MAC protocol.
Logically, the message exchange module 201 may be situated beneath an application layer 202. The application layer 202 then provides an interface to applications on the networking node 200 to exchange information with other networking nodes in the communication network 100.
On its turn, the message exchange module may be situated on top of a physical layer module 203 providing a way to the transport the message over a physical medium by a wired or wireless interface 204.
Definitions
In order to describe the further internal working or the message exchange module 201, this sections explains and defines some terminology and terms from graph theory.
A network topology as illustrated by
For u, v ε G, the path p(u, v) from u to v is defined as the sequence [x0(=u), x1, . . . , xi−1, xi, . . . , xp(=v)] such that the vertices xi are all distinct and vertex xi−1 is adjacent to xi, ∀(xi−1, xi)i=1, . . . , pε E. The length (u, v) of a path p(u, v) is defined as the sum (of the weights) of the edges along the path from u to v. The distance d(u, v) between two vertices u, v of the graph G denotes the shortest path p(u, v) from u to v. The diameter δ(G) of the graph G is defined as the largest distance between any two vertices u, ε V, i.e., δ(G)={d(u, )}.
Let X be a set and d the positive define metric or distance function defined as d: X×X→ such that ∀x, y, z ε X, d(x, y)=d(y, x)>0 when x≠y otherwise d(x, y)=d(y, x)=0) and d(x, z)≦d(x, y)+d(y, z), the tuple (X, d) defines a metric space. The metric space (X, d) is said geodesic if every pair of points x, y ε X can be joined by a continuous path of length d(x, y) a.k.a. geodesic path, where d(x, y) denotes the largest lower bound of the length of all curves joining x and y.
A geodesic path joining x to y is then a continuous map y (piecewise curve from x to y) from a closed interval [0, ] ε →X such that γ(0)=x, γ()=y and d(γ(s), γ(t))=|s−t|, ∀ s, t ε [0, ]. In particular, d(γ(0), γ())=d(x, y). The image of such path is called a geodesic segment with endpoints x and y.
In a geodesic metric space (X, d), an (l, e)-quasi-geodesic is as an (l, e)-quasi-isometric map γ from the closed segment [a, b] ε →X if there exist constants λ≧1 and ε≧0 such that ∀ s, t ε [a, b], λ−1|s−t|−ε≦d(γ(s), γ(t))≦λ−1|s−t|+ε. In a hyperbolic metric spaces such as H2, quasi-geodesics closely follow geodesics.
Object Locators
In order to locate data objects and networking nodes within the communication network 100, the message exchange module 201 uses object locators. These object locators are both used to identify and locate objects within the communication network 100. To uniquely identify any object, an object locator is represented by a set of geometric coordinates of the object. These coordinates represent the position of the object in a negatively curved hyperbolic space. This hyperbolic represents the topology of the communication network, but not in terms of Euclidean distances. The mapping between the communication network and the hyperbolic space is done by the physical property of travel time, i.e., a distance between coordinates of objects in this hyperbolic metric space represents the time that it takes for messages to travel between these respective object. An example of such a property of travel time is the Round Trip Time or RTT defined as the time it takes for a message to travel back and forth between networking nodes.
For the representation of the geometric coordinates, the values of the coordinates may be represented by a 2-dimensional unit hyperboloid of curvature K, also known as the Minkowski model or the Lorentz model. In this case, the distance between two points and thus coordinates x=(x1, x2) and y=(y1, y2) is given by the following formula:
d
H(x, y)=arccosh(√{square root over ((1+Σi=12xi2)+(1+Σi=12yi2))}−Σi=12xiyi)κ (Eq. 1)
A hyperbolic metric space is further defined by its curvature κ or by its δ-hyperbolic property. The δ-hyperbolic property of a hyperbolic space of curvature κ<0 is given by the relationship δ=ln(1+√{square root over (2)})/√{square root over (−κ)}. i.e., the smaller the δ-hyperbolic property, the “more hyperbolic” the space. Intuitively, the δ-hyperbolic property measures the deviation of the graph from tree-likeness which is obtained when δ=0 and which corresponds to a curvature ε=−∞. Empirical tests have shown that this value ranges between 2 and 2.5 which provides a trade-off between “tree-likeness”, which is optimal in terms memory space, “near-optimal paths” and thus resilience and “shortcuts”.
Determining Object Locators
According to an embodiment, message exchange module 201 comprises an object locator determining module 210 in order to determine an object locator for the networking node 200 and in order to collaborate on determining object locators for neighbouring networking nodes. A neighbouring networking node should be understood as networking nodes within a predetermined amount of hops from the networking node 200. In order to determine the object locator, the networking node needs distance information with regards to its neighbouring nodes, i.e., it needs to know the travel times for messages exchanged with its neighbouring nodes. In order to acquire this information, object locator determining module 210 is configured to send messages to neighbouring nodes within a specified number k of hops and to receive the back the times that it took the message to travel to the respective neighbouring node.
According to a further embodiment of the invention, the object locator and thus coordinates of the networking node 200 is then determined by the object locator determining module 210 by using a variant of the Vivaldi algorithm where the algorithm is performed in the hyperbolic space instead of the Euclidean space. This Vivaldi algorithm was initially disclosed by Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris, in “Vivaldi: A Decentralized Network Coordinate System”, ACM SIGCOMM'04, Aug. 30-Sep. 3, 2004, Portland, Oreg., USA. The computation of the individual vertex coordinates from the subset pair of distances between vertices, is performed by minimizing the symmetric distortion of these pairs. It is also assumes that nodes may store information corresponding to the decreasing computation convergence time and/or increasing accuracy. Selection of this information can either be based on spatial, e.g., distance in number of hops, or temporal criteria.
COORD(x)=(0,0)
where x is the node 200 and COORD( ) stands for the coordinates of the vector in its argument, i.e., of x and thus of node 200.
In the step 401 it is first verified whether the absolute or relative error e(x) on COORD(x) is larger than a predefined threshold value. If not, the algorithm ends and the object locator of node 200 is no longer updated. As the algorithm is iterative, step 401 is also the last step. The absolute or relative error e(x) on COORD(x) may be determined in steps during a previous iteration of the algorithm or may be determined beforehand. For example, node 200 may receive distance values from other nodes during operation by which it can update its error and thus decide to start updating its object locator.
Then in step 402, the object locator determining module 210 acquires location information from its direct neighbouring nodes, i.e., from its 1-hop neighbours. This location information comprises the distance to the neighbouring node, the coordinates of the neighbouring node y represented as COORD(y) and the absolute or relative error e(y) as computed by the neighbouring node y. Step 402 may further be performed as follows:
Then node 200 proceeds to step 403 and verifies whether the coordinates COORD(y) received from node y are different from zero. If not, the object locator COORD(x) is updated in step 404 by using the received location information:
COORD(x)←COORD(x)+e(x, y).|RTT(x, y)−d(x, y)|.u(x−y)
where:
When the coordinates provided by the neighbouring node y are zero, the algorithm proceeds to step 405. In step 405, the same procedure is followed as in step 402, but the location information is acquired from a neighbouring node z which is further than 1 hop away from networking node x. This may be done as follows:
At that moment, there are two possibilities. Either there was no node within the MAX_HOP range and thus the acquired coordinates of the last node z were also zero, either a node z was found which had coordinates different from zero. This condition is tested in step 406. In the first case, the coordinates of node x are updated in step 407 in a similar way as in step 404:
COORD(x)←COORD(x)+e(x, z).|RTT(x, z)−d(x, z)|.u(x−z)
where:
In the other case, there is no location information available from a node with coordinates different than zero. Therefore the coordinates of node x are updated by using the Round Trip Time between node x and z:
COORD(x)←COORD(x)+c.RTT(x, z).u(x−z)
where:
When the appropriate steps from steps 402 to 408 have been performed for all 1-hop neighbouring nodes y or for farther neighbouring nodes y when necessary, the algorithm proceeds back to step 401 where the updated relative error e(x) is again compared with the threshold. When the normalized absolute error drops below the threshold, convergence has been reached and the node 200 is assigned with the latest value of COORD(x) as object locator.
According to the above embodiment, the algorithm is performed from the local to the remote nodes, i.e., starting from the nodes in the closest neighbourhood. Alternatively, the algorithm may also be performed by polling directly nodes being more than one-hop away from the querying node, for example by using the MAX_HOP range which allows to poll more distant nodes first. Such an approach may be advantageous by improving convergence. In particular if the most distant nodes can be identified as this would lead to the highest precision in the coordinate computation.
According to the above embodiment, the algorithm is completely distributed and the decision process decentralized. Whereas measurement are by definition “distributed”, the decision and/or computational process may also be completely or partially centralized by collecting measurement information at a repository and communicate subsequent decisions, for example the computed coordinates, to the distributed nodes.
Obtaining Data Objects
According to an embodiment, the message exchange module 201 further comprises a locator retrieval module 211, a localization module 212 and decision module 213. These modules are used to retrieve a data object from a server node within the communication network.
In a first step 301, the location retrieval module 211 issues a request over the network interface 204 for object locators locating a certain data object. This request may for example originate from the upper application layers 202 where the data object is requested for by one or more attributes identifying this data object. Such attribute may for example be a Uniform Resource Locator or URL, a qualitative and/or quantitative qualifier. The request may for example be addressed to a known networking node in the communication network running a name service associating data object attributes such as for example name to their respective object locator or set of object locators.
Then, in step 302, the location retrieval module receives a set of object locators yi specifying the location of the data object within the communication network. These object locators are represented by coordinates of the data object in the hyperbolic metric space as described before. As a set of object locators is received, this means that the data object may be available at different locations within the communication network. Referring back to the network topology of
In step 303, the localization module 212 then calculates the hyperbolic distance between the client node and each of the locations of the data object. This computation may be performed by applying the formula from Eq. 1 were the first set of coordinates is the object locator of the client node 200 and the second set of coordinates is the object locator of the respective data object as received in step 302. The obtained values are thus a direct measure of the physical distance and thus the travel time between the client node 200 and the data object within the network.
Therefore, in step 304, the decision module 213 selects the data object locator within the shortest hyperbolic distance from the client node 200.
Referring back to the example of
In the last step 305, the decision module 213 then issues a request for the data object by specifying the selected object locator as the destination address.
The localization module may also be used for other cases where the distance between objects identified by object locators is to be known. For example, when a message is received by the networking node 200 having an object locator yj, the locator retrieval module calculates the distance d(yj, x) between the coordinate associated to the source x, i.e., the object locator of the source as retrieved from the header of the message, and the destination yj.
Routing
According to an embodiment, the message exchange module 201 of a networking node 200 may further comprise a routing module 215 and routing table 214. In these modules, the intrinsic properties of the network that is mapped to the hyperbolic space are further exploited for the routing of message throughout the communication network. The routing module 215 routes messages within the network according to the shortest hyperbolic distance, i.e., according to geodesics in the hyperbolic space. This way, the distance values obtained by the localization module 212 corresponds to the length of the routing path along which the message is routed in the communication network.
It is thus important to ensure 100% success rate wherein the success rate corresponds to the percentage of messages that reach their destination following routing decisions. Therefore, it must be ensured that a routing path exists between a requesting networking node and a destination networking node and that such routing path corresponds to the closest distance properties where the distance relates to the distance as defined by Eq. 1. Routing table 214 is therefore populated with entries pointing to coordinate sets indicative for logical partitions of the negatively curved hyperbolic metric space. These logical partitions thus describe areas of the communication network, but not based on geographical locations, but by the distance metric in the hyperbolic metric space. These logical partitions may further be partially overlapping. Logical partitions of the hyperbolic space may further refer to the segmentation of the space in regions which can be delimited by the extreme points of a polyhedron delimiting it. This technique offers the mean to summarize a complete portion of the space and thus its coordinate system without requiring enumeration of all elements belonging to this portion of the space.
For this purpose, each vertex or networking node u ε V(G) may maintain a vector du=[{dG(u, ), dH(u, )=(u, )}, ∀ ε V|dG(u, )≦k] from itself to all other nodes ε V(G) that are reachable within k networking nodes (dG(u, )≦k and wherein dG denotes the canonical graph distance metric in vertex units). By defining the routing table 214 in this way, the admissible set of possible routing paths is extended beyond the minimal set of optimal paths, i.e., beyond the set of geodesic paths. The routing table 214 thus also comprises the subset of discoverable near-optimal paths of which the image is also referred to as the quasi-geodesic segments.
The routing module 215 may then calculate routing paths for incoming messages that are to be propagated further towards their destination by exploiting the intrinsic distance property embedded in the object locator of the destination. This operation may for instance be realized by routing an incoming message to a neighbouring node where it is derived from the routing table that the destination object locator is comprised in the logical partition that is reachable by the identified neighbouring node.
In order to maintain the routing table, the routing module runs a discovery procedure to discover near-optimal segments. This discovery procedure is driven by the value of k which determines the standard vertex distance metric to be covered from each networking node x ε V(G) such that x can discover the segments located in its neighborhood as defined by the ball B(x, k) of radius k centered at node x. For this purpose, each vertex explores its local neighbourhood to detect the so-called k-local geodesics γ:d(γ(s), γ(t))=|s−t|, ∀ s, t ε [a, b] with |s−t|≦k. This way, the calculated routing paths are comprised within the limits of k-local geodesic. This follows the Theorem III.H.1.13 as disclosed in the publication “Metric Spaces of Non-Positive Curvature” by M. Bridson and A. Haefliger in volume 319 of Comprehensive Surveys in Mathematics, Springer-Verlag, Berlin, 1999. In there, it is disclosed that k-local geodesics correspond to quasi-geodesic segments if the metric space (X, d) defines a negatively curved d-hyperbolic geodesic metric space. Thus, provided that the negatively curvature condition is locally verified for each ball B(x, k) centered at each node x, which is provably the case for graphs quasi-isometric to trees, the identification of k-local geodesics leads to the enumeration of quasi-geodesic segments. It is also desirable that the deviation between the geodesic γuv and the (λ, ε)-quasi-geodesic γ′uv joining the same end points u, v of the hyperbolic geodesic space remains as close as possible. The latter follows from the δ-hyperbolic property of the graph underlying the Internet topology for which the deviation d(γuv, γ′uv) is the smallest. From the routing perspective, the major advantage is that in absence of the optimal geodesic path towards the destination object locator, an alternative near-optimal path corresponding to a local optimum can always be found provided that the edges of the graph are properly weighted. For example by the hyperbolic distance or an information which enables to derive it, such as the transit delay, and that the deviation of near-optimal paths from the corresponding optimal path is provably limited. A further advantage is that the stability property of quasi-geodesics implies that the routing decisions are robust and offer the possibility to consider the alternate (quasi-)geodesic path(s) to ensure resilience of destination reachability.
Finally, in order to dynamically populate its routing tables, a routing module 215 and thus vertex u ε V(G) waits for changes of local link weight ω(u, x) from u to neighbor x or for messages from its neighbors x translating changes in their own distance vector in order to update its own vector: ∀ ε V: dH(u; )←minx{ω(u, x)+(dG(x, )=(x, ))|dG(u, v)≦k}. Thus, only information from nodes within the number k of hops from the networking node is used. In order to apply this principle also to the surroundings nodes, the routing module 215 may further propagate the updates only within k hops from the source networking node that initiated the update.
The main advantage of the above embodiments are further illustrated by an example elaborated in this section with reference to
In the network topology the path along nodes 110-107-101, which is the path with the minimum hop-count distance dG(r, s1), is not the path with the shortest hyperbolic distance dH(r, s1). The path with the shortest hyperbolic distance is the path along nodes 110-106-105-104-103-102-101. Therefore, the routing module of requester r will identify the latter path as the shortest path to server s1 and thus issue a message to server s1 by sending the message to neighbouring node 106.
In an alternative scenario, a data copy of the object can be (temporarily or not) available at multiple servers nodes 101 and 104. In this case, node 110 receives a response in step 302 including multiple data object locators, i.e., the coordinates set {y1, y4}. For each coordinate pairs of this set, node 110 calculates the hyperbolic distance dH to the server 101 or s1 (dH(x, y1)) and to the server 104 or s4 (dH(x, y4)) according to step 303 in
Results
The table below compares the asymptotic upper bounds of the performance metrics characterizing the routing according to the above embodiments with information routing systems based on the Border Gateway Protocol or BGP or, more generally, the path-vector routing algorithm. The latter relies on the exchange of content locators taken out of the IP address space. One can observe a factor gain of n (number of nodes) in the memory space required to store routing information and a factor gain of √{square root over (n)} in the memory space required to store routing tables while limiting the routing path stretch increase to a small additional constant characterizing the geometric property of the topology at the detriment of an additive-stretch increase,
The steps illustrated by the above embodiments may be implemented as programming instructions stored in local memory 504 of the computing system 500 for execution by its processor 502. Alternatively the instructions may be stored on the storage element 508 or be accessible from another computing system through the communication interface 512.
Although the present invention has been illustrated by reference to specific embodiments, it will be apparent to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied with various changes and modifications without departing from the scope thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. In other words, it is contemplated to cover any and all modifications, variations or equivalents that fall within the scope of the basic underlying principles and whose essential attributes are claimed in this patent application. It will furthermore be understood by the reader of this patent application that the words “comprising” or “comprise” do not exclude other elements or steps, that the words “a” or “an” do not exclude a plurality, and that a single element, such as a computer system, a processor, or another integrated unit may fulfill the functions of several means recited in the claims. Any reference signs in the claims shall not be construed as limiting the respective claims concerned. The terms “first”, “second”, third”, “a”, “b”, “c”, and the like, when used in the description or in the claims are introduced to distinguish between similar elements or steps and are not necessarily describing a sequential or chronological order. Similarly, the terms “top”, “bottom”, “over”, “under”, and the like are introduced for descriptive purposes and not necessarily to denote relative positions. It is to be understood that the terms so used are interchangeable under appropriate circumstances and embodiments of the invention are capable of operating according to the present invention in other sequences, or in orientations different from the one(s) described or illustrated above.
Number | Date | Country | Kind |
---|---|---|---|
15290171.6 | Jul 2015 | EP | regional |