亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? rfc2992.txt

?? RFC 的詳細(xì)文檔!
?? TXT
?? 第 1 頁(yè) / 共 2 頁(yè)
字號(hào):






Network Working Group                                            C. Hopps
Request for Comments: 2992                           NextHop Technologies
Category: Informational                                     November 2000


             Analysis of an Equal-Cost Multi-Path Algorithm

Status of this Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2000).  All Rights Reserved.

Abstract

   Equal-cost multi-path (ECMP) is a routing technique for routing
   packets along multiple paths of equal cost.  The forwarding engine
   identifies paths by next-hop.  When forwarding a packet the router
   must decide which next-hop (path) to use.  This document gives an
   analysis of one method for making that decision.  The analysis
   includes the performance of the algorithm and the disruption caused
   by changes to the set of next-hops.

1.  Hash-Threshold

   One method for determining which next-hop to use when routing with
   ECMP can be called hash-threshold.  The router first selects a key by
   performing a hash (e.g., CRC16) over the packet header fields that
   identify a flow.  The N next-hops have been assigned unique regions
   in the key space.  The router uses the key to determine which region
   and thus which next-hop to use.

   As an example of hash-threshold, upon receiving a packet the router
   performs a CRC16 on the packet's header fields that define the flow
   (e.g., the source and destination fields of the packet), this is the
   key.  Say for this destination there are 4 next-hops to choose from.
   Each next-hop is assigned a region in 16 bit space (the key space).
   For equal usage the router may have chosen to divide it up evenly so
   each region is 65536/4 or 16k large.  The next-hop is chosen by
   determining which region contains the key (i.e., the CRC result).







Hopps                        Informational                      [Page 1]

RFC 2992               Analysis of ECMP Algorithm          November 2000


2.  Analysis

   There are a few concerns when choosing an algorithm for deciding
   which next-hop to use.  One is performance, the computational
   requirements to run the algorithm.  Another is disruption (i.e., the
   changing of which path a flow uses).  Balancing is a third concern;
   however, since the algorithm's balancing characteristics are directly
   related to the chosen hash function this analysis does not treat this
   concern in depth.

   For this analysis we will assume regions of equal size.  If the
   output of the hash function is uniformly distributed the distribution
   of flows amongst paths will also be uniform, and so the algorithm
   will properly implement ECMP.  One can implement non-equal-cost
   multi-path routing by using regions of unequal size; however, non-
   equal-cost multi-path routing is outside the scope of this document.

2.1.  Performance

   The performance of the hash-threshold algorithm can be broken down
   into three parts: selection of regions for the next-hops, obtaining
   the key and comparing the key to the regions to decide which next-hop
   to use.

   The algorithm doesn't specify the hash function used to obtain the
   key.  Its performance in this area will be exactly the performance of
   the hash function.  It is presumed that if this calculation proves to
   be a concern it can be done in hardware parallel to other operations
   that need to complete before deciding which next-hop to use.

   Since regions are restricted to be of equal size the calculation of
   region boundaries is trivial.  Each boundary is exactly regionsize
   away from the previous boundary starting from 0 for the first region.
   As we will show, for equal sized regions, we don't need to store the
   boundary values.

   To choose the next-hop we must determine which region contains the
   key.  Because the regions are of equal size determining which region
   contains the key is a simple division operation.


                regionsize = keyspace.size / #{nexthops}
                region = key / regionsize;


   Thus the time required to find the next-hop is dependent on the way
   the next-hops are organized in memory.  The obvious use of an array
   indexed by region yields O(1).



Hopps                        Informational                      [Page 2]

RFC 2992               Analysis of ECMP Algorithm          November 2000


2.2.  Disruption

   Protocols such as TCP perform better if the path they flow along does
   not change while the stream is connected.  Disruption is the
   measurement of how many flows have their paths changed due to some
   change in the router.  We measure disruption as the fraction of total
   flows whose path changes in response to some change in the router.
   This can become important if one or more of the paths is flapping.
   For a description of disruption and how it affects protocols such as

   TCP see [1].

   Some algorithms such as round-robin (i.e., upon receiving a packet
   the least recently used next-hop is chosen) are disruptive regardless
   of any change in the router.  Clearly this is not the case with
   hash-threshold.  As long as the region boundaries remain unchanged
   the same next-hop will be chosen for a given flow.

   Because we have required regions to be equal in size the only reason
   for a change in region boundaries is the addition or removal of a
   next-hop.  In this case the regions must all grow or shrink to fill
   the key space.  The analysis begins with some examples of this.

              0123456701234567012345670123456701234567
             +-------+-------+-------+-------+-------+
             |   1   |   2   |   3   |   4   |   5   |
             +-------+-+-----+---+---+-----+-+-------+
             |    1    |    2    |    4    |    5    |
             +---------+---------+---------+---------+
              0123456789012345678901234567890123456789

              Figure 1. Before and after deletion of region 3

   In figure 1. region 3 has been deleted.  The remaining regions grow
   equally and shift to compensate.  In this case 1/4 of region 2 is now
   in region 1, 1/2 (2/4) of region 3 is in region 2, 1/2 of region 3 is
   in region 4 and 1/4 of region 4 is in region 5.  Since each of the
   original regions represent 1/5 of the flows, the total disruption is
   1/5*(1/4 + 1/2 + 1/2 + 1/4) or 3/10.

   Note that the disruption to flows when adding a region is equivalent
   to that of removing a region.  That is, we are considering the
   fraction of total flows that changes regions when moving from N to
   N-1 regions, and that same fraction of flows will change when moving
   from N-1 to N regions.






Hopps                        Informational                      [Page 3]

RFC 2992               Analysis of ECMP Algorithm          November 2000


              0123456701234567012345670123456701234567
             +-------+-------+-------+-------+-------+
             |   1   |   2   |   3   |   4   |   5   |
             +-------+-+-----+---+---+-----+-+-------+
             |    1    |    2    |    3    |    5    |
             +---------+---------+---------+---------+
              0123456789012345678901234567890123456789

              Figure 2. Before and after deletion of region 4

   In figure 2. region 4 has been deleted.  Again the remaining regions
   grow equally and shift to compensate.  1/4 of region 2 is now in
   region 1, 1/2 of region 3 is in region 2, 3/4 of region 4 is in
   region 3 and 1/4 of region 4 is in region 5.  Since each of the
   original regions represent 1/5 of the flows the, total disruption is
   7/20.

   To generalize, upon removing a region K the remaining N-1 regions
   grow to fill the 1/N space.  This growth is evenly divided between
   the N-1 regions and so the change in size for each region is 1/N/(N-
   1) or 1/(N(N-1)).  This change in size causes non-end regions to
   move.  The first region grows and so the second region is shifted
   towards K by the change in size of the first region.  1/(N(N-1)) of
   the flows from region 2 are subsumed by the change in region 1's
   size.  2/(N(N-1)) of the flows in region 3 are subsumed by region 2.
   This is because region 2 has shifted by 1/(N(N-1)) and grown by
   1/(N(N-1)).  This continues from both ends until you reach the
   regions that bordered K.  The calculation for the number of flows
   subsumed from the Kth region into the bordering regions accounts for
   the removal of the Kth region.  Thus we have the following equation.

                           K-1              N
                           ---    i        ---  (i-K)
             disruption =  \     ---    +  \     ---
                           /   (N)(N-1)    /   (N)(N-1)
                           ---             ---
                           i=1            i=K+1

   We can factor 1/((N)(N-1)) out as it is constant.

                                /  K-1         N        \
                          1     |  ---        ---       |
                     =   ---    |  \    i  +  \   (i-K) |
                       (N)(N-1) |  /          /         |
                                \  ---        ---       /
                                     1        i=K+1





Hopps                        Informational                      [Page 4]

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩高清欧美激情| 国产精品资源网| 精品国产一区二区三区久久久蜜月 | 91网站在线观看视频| 天天操天天干天天综合网| 久久理论电影网| 欧美日韩亚洲国产综合| 成人高清免费观看| 另类小说综合欧美亚洲| 一区二区三区不卡视频| 亚洲国产高清aⅴ视频| 欧美肥胖老妇做爰| 91在线观看高清| 国模无码大尺度一区二区三区| 亚洲一级不卡视频| 国产精品毛片久久久久久| 精品日韩av一区二区| 欧美视频自拍偷拍| 成人91在线观看| 国产精品资源网| 久久精品国产第一区二区三区| 亚洲一区二区三区四区在线观看| 欧美国产欧美亚州国产日韩mv天天看完整| 91精选在线观看| 欧美私模裸体表演在线观看| va亚洲va日韩不卡在线观看| 国产99一区视频免费| 国产在线观看一区二区| 免费观看一级特黄欧美大片| 亚洲国产欧美在线| 一区二区三区精品视频在线| 亚洲精品欧美综合四区| 亚洲色图欧美激情| 亚洲乱码中文字幕| 亚洲人精品一区| 亚洲欧美成aⅴ人在线观看| 国产精品色哟哟| 国产精品国产三级国产aⅴ中文| 久久人人97超碰com| 久久亚洲一级片| 久久久久久久国产精品影院| www精品美女久久久tv| 日韩欧美一区电影| 精品久久久久久无| 久久久久久久久97黄色工厂| 久久亚洲捆绑美女| 国产欧美一区二区三区鸳鸯浴| 久久久精品免费观看| 国产人成亚洲第一网站在线播放| 国产视频一区二区在线观看| 国产精品私房写真福利视频| 国产精品美女久久久久久| 亚洲天堂成人网| 亚洲综合区在线| 日韩高清不卡一区| 国产最新精品精品你懂的| 韩国av一区二区三区在线观看| 国产精一品亚洲二区在线视频| 国产凹凸在线观看一区二区| 成人av资源网站| 91福利资源站| 日韩精品一区二区三区在线播放| 欧美成人r级一区二区三区| 精品国精品国产| 亚洲成av人片www| 丝瓜av网站精品一区二区| 久久99国产精品久久99| 粉嫩一区二区三区性色av| aaa欧美大片| 欧美日本国产视频| 精品国产三级a在线观看| 国产精品丝袜一区| 亚洲va欧美va人人爽| 韩国视频一区二区| 色狠狠av一区二区三区| 欧美一区二区三区在线视频| 久久精品亚洲一区二区三区浴池| 亚洲人吸女人奶水| 九色|91porny| 91国产丝袜在线播放| 26uuu久久天堂性欧美| 亚洲欧美日韩国产一区二区三区 | av中文字幕在线不卡| 欧美理论电影在线| 国产片一区二区三区| 亚洲动漫第一页| 国产毛片精品一区| 欧美视频日韩视频| 久久这里只精品最新地址| 亚洲精品免费看| 精品一区二区三区视频| 99国产精品久久久久久久久久久| 欧美一区二区三区视频在线观看| 亚洲国产成人一区二区三区| 午夜成人在线视频| 波波电影院一区二区三区| 日韩一区和二区| 亚洲精品成人悠悠色影视| 韩国av一区二区三区| 欧美日韩国产首页| 国产精品国产精品国产专区不片| 日本强好片久久久久久aaa| 91麻豆免费观看| 国产日韩欧美麻豆| 免费高清在线一区| 欧美视频一区二区三区| 中文字幕一区二区三区视频| 精品一区二区在线视频| 在线国产亚洲欧美| 一区在线播放视频| 国产精品99久久久久久宅男| 欧美一区二区久久| 亚洲国产精品久久久久婷婷884 | 一本一道久久a久久精品| 国产亚洲一区字幕| 久久国产日韩欧美精品| 欧美三区免费完整视频在线观看| 国产精品高潮久久久久无| 国产精品888| 日韩免费看网站| 秋霞影院一区二区| 欧美精选在线播放| 久久成人免费电影| 51精品视频一区二区三区| 亚洲午夜一区二区三区| 91欧美一区二区| 国产精品久久99| 国产a精品视频| 国产色综合久久| 国产精品小仙女| 久久伊人中文字幕| 国产一区视频在线看| 精品国产制服丝袜高跟| 精品亚洲成a人在线观看 | 久久精品欧美日韩| 精品一区二区三区免费视频| 精品国产一二三区| 精油按摩中文字幕久久| 26uuu国产在线精品一区二区| 极品少妇一区二区| 久久免费视频色| 国产高清不卡一区| 国产精品免费网站在线观看| 成人激情文学综合网| 日韩理论在线观看| 色呦呦国产精品| 亚洲成a天堂v人片| 日韩丝袜美女视频| 国产一区二区91| 国产精品三级视频| 91在线云播放| 亚洲资源中文字幕| 3d成人动漫网站| 久久99久久久久久久久久久| 337p粉嫩大胆噜噜噜噜噜91av| 国产精品一区在线| 中文字幕高清不卡| 日本丰满少妇一区二区三区| 日韩在线卡一卡二| 日韩欧美美女一区二区三区| 国产99久久久国产精品潘金网站| 17c精品麻豆一区二区免费| 91电影在线观看| 免费欧美在线视频| 欧美国产精品中文字幕| 在线视频你懂得一区二区三区| 亚洲成人综合视频| 久久先锋影音av| 91在线观看免费视频| 日韩av二区在线播放| 国产视频不卡一区| 欧美性videosxxxxx| 黄一区二区三区| 亚洲人妖av一区二区| 日韩一区二区在线观看视频| 国产不卡视频在线播放| 亚洲国产日韩精品| 欧美精品一区二区三区蜜桃视频| 99精品在线观看视频| 日韩经典一区二区| 欧美激情一区二区三区全黄| 欧美日韩中文另类| 高清不卡一区二区在线| 午夜精品影院在线观看| 久久久不卡网国产精品二区| 在线观看不卡视频| 激情五月婷婷综合网| 亚洲最新在线观看| 国产欧美精品一区aⅴ影院 | 欧美一区二区三级| 成人在线综合网| 日本va欧美va精品发布| 综合在线观看色| 久久蜜臀中文字幕| 欧美日韩一区二区电影| 成人美女视频在线观看18| 久久国产生活片100| 亚洲在线视频一区| 亚洲国产高清在线观看视频| 日韩欧美视频在线|