• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Efficient Routing Protection Algorithm Based on Optimized Network Topology

    2022-11-11 10:44:58HaijunGengZikunJinJiangyuanYaoHanZhangZhiguoHuBoYangYingijeGuoWeiWangQidongZhangandGuoaoDuan
    Computers Materials&Continua 2022年9期

    Haijun Geng,Zikun Jin,Jiangyuan Yao,Han Zhang,Zhiguo Hu,Bo Yang,Yingije Guo,Wei Wang,Qidong Zhang and Guoao Duan

    1School of Computer and Information Technology,Shanxi University,Shanxi,030006,China

    2School of Automation and Software Engineering,Shanxi University,Shanxi,030006,China

    3School of Computer Science and Technology,Hainan University,Haikou,570228,China

    4Department of Computer Science&Technology,Tsinghua University,Beijing,100084,China

    5Department of Urban&Regional Planning San José State University,San José,CA,95192,USA

    6Key Laboratory of Embedded System and Service Computing(Tongji University),Ministry of Education,Shanghai,201804,China

    7Institute of Fundamental and Frontier Sciences,University of Electronic Science and Technology of China,Chengdu,610054,China

    8Beijinng University of Technology,Beijing-Dublin International College,Beijing University of Technology,Beijing,100124,China

    Abstract: Network failures are unavoidable and occur frequently.When the network fails,intra-domain routing protocols deploying on the Internet need to undergo a long convergence process.During this period, a large number of messages are discarded, which results in a decline in the user experience and severely affects the quality of service of Internet Service Providers(ISP).Therefore, improving the availability of intra-domain routing is a trending research question to be solved.Industry usually employs routing protection algorithms to improve intra-domain routing availability.However, existing routing protection schemes compute as many backup paths as possible to reduce message loss due to network failures, which increases the cost of the network and impedes the methods deployed in practice.To address the issues,this study proposes an efficient routing protection algorithm based on optimized network topology(ERPBONT).ERPBONT adopts the optimized network topology to calculate a backup path with the minimum path coincidence degree with the shortest path for all source purposes.Firstly,the backup path with the minimum path coincidence with the shortest path is described as an integer programming problem.Then the simulated annealing algorithm ERPBONT is used to find the optimal solution.Finally,the algorithm is tested on the simulated topology and the real topology.The experimental results show that ERPBONT effectively reduces the path coincidence between the shortest path and the backup path, and significantly improves the routing availability.

    Keywords: Routing protection algorithm; network availability; network failure;shortest path;backup path

    1 Introduction

    With the development of the Internet,the range of supported applications has shown significant changes.Initially,the Internet mainly supported some non-real-time applications,such as e-mail,file transfer, etc.Nowadays, a large amount of real-time business data [1,2] is widely spread over the Internet, such as Voice over Internet Protocol (VoIP), online stock trading, remote surgery, video streaming,instant messaging,and so forth.These new applications put forward higher requirements for routing availability [3,4].Thus, routing availability will directly affect the property security and even users’life quality.Relevant studies have shown that network failures frequently occur[5,6],and are unavoidable.During the failure repair period,the routing protocol needs to go through a period of the convergence process.In this process,there will be routing black holes,routing loops[7-9],which lead to network interruption,packet loss,and greatly reduce routing availability.Previous studies[10]demonstrated that when an OC-48 link is disconnected for 10 s, 3 million 1KB packets will be lost.In real-time applications,it is usually required to repair the failures in milliseconds.For current intradomain routing protocols,e.g.,OSPF and IS-IS,it takes several or even tens of seconds to complete convergence,which fails to meet the requirements of real-time applications for routing availability[11].Therefore,how to improve the availability of intra-domain routing[12]has become an urgent Internet research problem.More research are focused on the problem of how to improve the network’s ability to respond to failures quickly.

    Current algorithms aiming to improve the availability of intra-domain routing can be divided into two categories[13],passive recovery algorithms and routing protection algorithms.Among them,the passive recovery algorithm[14]mainly investigates how to speed up the route convergence when the network fails,and shorten the network interruption time as much as possible.However,when the links in a network are frequently disconnected,the algorithm may cause routing instability.According to the relevant rules,the routing protection algorithm[15]calculates the backup routes in advance.When the network fails,the backup routes calculated in advance are used to forward packets,which minimizes the loss of messages and shortens the network service interruption time.In comparison,the routing protection algorithm is more favored by the academic community.

    As the earliest routing protection algorithm applied to the Internet, Equal Cost Multiple Paths(ECMP)proposed that if there are multiple paths from the source node to the destination node with the same minimum cost, they can be used as a backup path.Although the algorithm is simple to implement and easy to deploy,it requires the backup path to have the same minimum cost.Therefore,the ECMP algorithm does not contribute much to routing availability.Research [16] was developed to configure the shortest path with the same cost by adjusting the link weights,but this problem was proved to be an NP-Hard problem.

    In response to the problems of ECMP, the Internet Engineering Task Force (IETF)released a framework for fast rerouting.On the basis of this framework,Loop-free alternates(LFA),Not-Viabased routing protection scheme[17]and tunnel-based routing protection scheme[18]are proposed.In all routing protection schemes,LFA has received close attention from the industry for its simplicity,and has been deployed and supported by router manufacturers such as Huawei and H3C.Although LFA is simple and easy to deploy,it has a fatal disadvantage—LFA cannot protect all possible single failure scenarios in the network.In order to solve the problems, the author used the theoretical knowledge of graph theory to analyze the problem of LFA failure coverage in the paper [19].The routing availability of LFA is increased by adjusting the cost of the link in the network,but this method does not necessarily guarantee to deal with all single failure situations.For this reason, the author theoretically analyzed in-depth relationship between LFA’s routing availability and network topology[20],and improved the single-failure protection situation of LFA by adding links.

    Reference [21] was proposed to use the routing deflection algorithm to improve the routing availability,that is,first use the loop-free rule to calculate all the optional next hops from the source node to the destination node,and then use the label technology to realize the flexible forwarding of the message.Although this algorithm can improve routing availability,its implementation is complicated and expensive,making it difficult to actually deploy.

    Multiple Routing Configurations (MRC)[22] proposes to save multiple configuration diagrams for each router.Each configuration includes all nodes and links.By adjusting link weights,some nodes and links are protected in this configuration.Finally,a configuration diagram for all possible single failures is constructed.When the message encounters a failure in the forwarding process, the preconfigured route can be used to forward the message.However,in real networks,this algorithm needs to consume a lot of computing resources and storage overhead.

    Failure Carrying Packet(FCP)[23]proposes to store the failure information encountered in the forwarding process of the message in the header of the message.When the message reaches a node,the node first detects the failure information field in the header of the message,constructs a new topology according to the field,and then re-calculates the shortest path using the new topology,so as to realize the loop-free forwarding of messages.The major advantage of this algorithm is that it eliminates the routing convergence process.However,it has high computational complexity and large changes to the routing protocol,so it is not easy to deploy in practice.

    In order to solve the problem that the existing routing protection methods have low failure protection ration and can not be deployed in practice, this paper proposes an Efficient Routing Protection Algorithm Based on Optimized Network Topology(ERPBONT).

    The contributions of the paper can be summarized as follows:

    1.ERPBONT is easy to implement and deploy in the real networks.

    2.ERPBONT can effectively solve the problem of low failure recovery ratio caused by network failures.

    3.ERPBONT can significantly reduce the path coincidence degree,and has the ability to quickly recover from the failed network.

    2 Network Model and Problem Description

    2.1 Network Model

    The network topology can be represented by an undirected connected graph [24-26]G=(V,E,W).WhereV,E,Wrespectively represents the set of nodes, the set of links, and the set of costs of links in the network,is the complement ofE.For link(u,v) ∈Ein the network,w(u,v)represents the cost of the link.Currently,the intra-domain routing protocols deployed on the Internet,such as OSPF and IS-IS, takeG=(V,E,W) as input and use the Dijkstra algorithm to calculate the shortest path of all source-destination pairs.When the network is in a normal state, all sourcedestination pairs use the shortest path to transmit packets,but when a failure occurs in the network,the packets passing through the failure will be discarded.Therefore, the routing protection method is widely used in the industry to minimize the message loss caused by network failure.The routing protection method is to calculate some backup paths for all source-destination pairs in the network.When the shortest path fails,the backup path can be used to forward packets,thereby greatly reducing the packet loss ratio caused by network failures.However, the existing routing protection algorithm calculates multiple backup paths for all source-destination pairs in order to increase the probability of the message being successfully forwarded,which not only increases the calculation overhead,but is also not easy to be deployed in actual networks.In order to solve the above-mentioned problems of existing routing protection algorithms, this paper calculates only one backup path for all sourcedestination pairs,and uses path coincidence to measure the difference between the backup path and the shortest path.

    The following details the path coincidence degree.Given a network topologyG=(V,E,W),for any source-destination pairsanddin the network,SP(s,d)represents the set of edges in the shortest path between the pair of nodessanddin network topologyG=(V,E,W).The optimized network topology isG′=(V,E′,W′),BP(s,d)represents the set of edges in the shortest path between node pairssanddin network topologyG′=(V,E′,W′).

    The path coincidence degree between the pair of nodes can be expressed as:

    The path coincidence degree between all node pairs in the network can be expressed as:

    The network model defined above is explained by a specific example.The figure on the left in Fig.1 shows a network topology with four nodes and four links,E= {(a,b),(a,d),(b,c),(c,d)},E= {(a,c),(b,d)},w(a,b) =w(b,a) = 3.The shortest pathSP(a,c) =(a,b,c)between node pairsa-cand the shortest pathSP(b,d) =(b,c,d)between node pairsb-d.The figure on the right in Fig.1 shows the optimized network topology,the backup path between node paira-cisBP(a,c)=(a,c),CD(a,c) == 0.Similarly, the backup path between node pairsb-disBP(b,d) =(b,d),CD(b,d)==0.

    Figure 1:Original network topology(left)and optimized network topology(right)

    2.2 Problem Description

    This paper aims to calculate two paths with the minimum coincidence degree for all sourcedestination pair in the network, which are the shortest path and backup path.Given a network topologyG=(V,E,W), the Dijkstra algorithm can be used to calculate the shortest path of all source-destination pairs.How to calculate the backup path is the key issue that this article needs to solve.

    Given a network topologyG=(V,E,W), there are many ways to calculate the backup path between all pairs of nodes.In order to be easy to deploy in the network,we choose the straightforward calculation method.That is, by expanding the original network topology structure, a new network topology structure is obtained, and the shortest path of the source-destination pair calculated in the new network topology structure is the backup path between the node pair.The problem can be expressed as:

    Given a network topologyG=(V,E,W), how to construct an extended topologyG′=(V,E′,W′) of the topologyG=(V,E,W), and use the extended topologyG′=(V,E′,W′) to calculate the backup path,so as to minimize the overlap of the network path.According to the original network topology, the method of constructing the extended network topology mainly includes: (1)Adjust the link weight(2)Virtually delete the link(3)Increase the link(4)Increase the nodes in the network.Method(1)and method(2)are relatively simple.Method(2)does not actual delete links in the network,but saves these links when calculating the backup path.Method(3)needs to add a certain number of links in the network.If the increased number of links is controlled within a certain range,this method will not introduce large additional overhead.Method(4)requires an additional increase in the number of nodes,and the deployment overhead is relatively large.In summary,this article adopts fusion methods(2)and(3)to construct the extended network topology.Mathematically,

    Eq.(1)is the objective function to minimize the path coincidence between the shortest path and the backup path.Eq.(2)indicates that the number of added links is the minimum value between 0.1 times and 5 of the number of links in the original network,whereALis the set of added links.Eq.(3)shows that the cost of adding links satisfies the triangle rule,that is,the cost of links in the network is the minimum of all path costs.Eq.(4)indicates that the number of deleted links is the minimum value between 0.1 times and 5 of the number of links in the original network,whereDLis the set of deleted links.Eq.(5)indicates that the number of links in the extended network topology is equal to the number of links in the original network topology plus the increased number of links,and then minus the number of deleted links.Eqs.(6)and(7)show that the cost of links in the network is symmetrical.Eqs.(8)and(9)show that the link cost of the network used in this paper is symmetrical.

    3 Algorithm

    The scientific problem solved in this paper is an NP-Hard problem, and it is difficult to obtain the optimal solution in limited computing time.Therefore, in order to reduce the deployment cost,this paper uses the heuristic method ERPBONT to calculate the approximate optimal solution.The algorithm are described in detail below.

    3.1 ERPBONT Algorithm

    ERPBONT is a two-stage algorithm,which is composed of adding link algorithm AddLink and Deleting Link algorithm DeleteLink.AddLink and DeleteLink expand the original network topology by adding and deleting links in the network,respectively.Through AddLink and DeleteLink,a better extended network topology can be calculated,thereby reducing the coincidence of network paths.

    Algorithm 1 introduces the execution process of ERPBONT in detail.The input of the algorithm is the original network topology, the shortest path set.The output of the algorithm is the extended network topology and the backup path.First use the AddLink algorithm to calculate the final added link setAL?L, and then use the DeleteLink algorithm to calculate the deleted link setDL?L.Finally,the extended network topologyG′=(V,E′,W′)is obtained,andE′=E-DL+AL.According to the extended network topology,the backup pathBPof all source-destination pairs in the network is calculated.

    Algorithm 1: ERPBONT Input: G =(V,E,W),T0 Output: BP 1: Begin 2: AL ←AddLink(G,T0)3: DL ←DeleteLink(G ∪AL,T0)4: G′=(V,E+AL-DL,W′)5: BP=Dijkstra(G′)6: End

    3.2 Add Link Algorithm

    Algorithm 2:AddLink Input:G =(V,E,W),T0 Output : AL 1: T =T0 2: G′=G 3: AL ←?4: original =current ←C(G,G′)5: While current ≥0 and T >0 and|AL|<5 6:(u,v)←argmin E(C(G,G′))7:E′←E ∪(u,v)8:G′=(V,E′,W′)9:(m,n)∈E-(u,v)10:current ←C(G,G′)11:If original <current or T >random(T0)Then 12:current ←C(G,G′)E ←(Continued)

    Algorithm 2:Continued 13:AL ←AL ∪(u,v)14:else 15:E ∪(u,v)16:EndIf 17:T =T -1 18: EndWhile 19: Return AL E ←

    The AddLink algorithm needs to solve the following three problems:(1)How many links to be added(2)Which links to be added(3)How to set the cost of adding links.The solutions to the three problems will be described below.

    As for the problem (1), adding too many links will change the original network topology and increase the cost of service providers.On the contrary, adding too few links will not significantly improve the performance of the network.This paper uses a compromise method to solve this problem,increasing the number of links to |AL| = min(5,|E|*0.1) increase the number of links will not exceed five.

    As for the problem(2),the links added by the topologyG=(V,E,W)can be selected from the set.The complexity of calculating the added link is,and the computational complexity is high,so this paper uses a simulated annealing algorithm to select the added link.

    As for the problem (3), if the link cost is set too large, the shortest path between all nodes in the network will not pass through the link,and the value of increasing the link will be lost.For any additional link(u,v) ∈, the cost of the link isw(u,v) =cost(u,v)-min(W), Wherecost(u,v)represents the cost between the shortest path between nodeuand nodev, min(W) represents the minimum cost of all links in the network.

    The input of the AddLink algorithm is the original network topology,the shortest path set and the initial temperature,where the initial temperature indicates the number of iterations of the algorithm,and the output is the increased link set.The variableTis set toT0,the extended network topology is initialized toG,the setALof added links is initialized to an empty set,and the original records the path coincidence degree between all pairs of nodes in the network(lines 1-4).The algorithm requires an iterative process to calculate the set of increased links.When the current path coincidence degree is equal to 0 or the system temperature is equal to 0 or the number of increase links is 5,the program execution is completed.In each iteration process,select a link(u,v)from the setto join the network,at this timeC(G,G′)has the minimum value.Update the parameters of the extended network topology(lines 7-8),delete the link(u,v)from the set,and calculate the current network coincidence degree(line 10).Whenoriginal <currentor the temperature in the system at this time is greater than the temperature generated by the random function, the link(u,v) is added to the setAL(lines 12-14);Otherwise,the operation of adding links(u,v)will be canceled(line 15 of the algorithm),and finally return to the set of adding linksAL(line 19).

    Algorithm 3:DeleteLink Input: G =(V,E,W),AL,T0 Output : DL 1: T ←T0 2: G′←G U AL 3: DL ←?8: L ←E 5: original =current ←C(G,G′)6 : While current ≥0 and T >0 7:(u,v)←arg min(m,n)∈E (C(G,G′))8 :E′←L-(u,v)9 :G′=(V,E′)10 :If isconnected(G′)Then 11:current ←C(G,G′)12:else 13:E′←E′∪(u,v)14:continue 15:EndIf 16:If original <current or T >random(T0)Then 17:original ←C(G,G′)18:L ←L-(u,v)19:DL ←DL ∪(u,v)20:else 21:E′←E′∪(u,v)22:EndIf 23:T =T -1 24: EndWhile 25: Return AL

    3.3 DeleteLink Algorithm

    The Deletelink algorithm needs to solve the following two problems: (1)how many links are deleted and(2)which links are deleted.The solutions to the two problems will be described below.

    For problem(1),the number of links added by the DeleteLink algorithm is|DL|=min(5,|E|*0.1).In order to keep the number of edges in the network unchanged,the number of links deleted by the DeleteLink algorithm is|DL|.

    For problem(2),the deleted link can be selected from setDL?E.The complexity of calculating the deleted link is,which is high.Therefore,this paper uses a simulated annealing algorithm to select the deleted link.

    The input of the DeleteLink algorithm is the original network topology, the outputALof AddLink and the initial temperature,where the initial temperature indicates the number of iterations of the algorithm,and the output is the deleted link set.Set the variable t toT0,initialize the extended network topology to the union ofGandAL, initialize the setDLof deleted links to an empty set,initialize the setLtoE, and original records the path coincidence degree between all node pairs in the network(lines 1-5).The algorithm needs to calculate the set of deleted links through an iterative process.When the current path coincidence degree is equal to 0 or the system temperature is equal to 0 or the number of deleted links is 5,the program execution is completed.In each iteration process,a link(u,v) is selected from the setLto join the network, andC(G,G′) has the minimum value at this time.If the networkG′is a connected graph at this time,update the parameters of the extended network topology,delete the link(u,v)from the setE,and calculate the current network coincidence degree(lines 7-11).If the networkG′is not a connected graph,the previous operation of updatingG′is canceled,and the next iteration process is executed.Whenoriginal <currentor the temperature in the system is greater than the temperature generated by the random function at this time,the link(u,v)is added to the setDL(lines 16-19);Otherwise,the operation of adding links(u,v)will be canceled(line 21),and finally return to the set of adding linksAL(line 25).

    3.4 Algorithm Example

    The following will use the form of a table to show the entire process of ERPBONT algorithm calculation on the topology of Fig.2.The left picture of Fig.2 represents the original topology,and the right picture is the topology optimized by the ERPBONT algorithm.The yellow edge represents the newly added link, and the red edge represents the virtual deleted link.The table only shows the change in the shortest path of the update link.A blank item indicates that the shortest path has not changed in the current state and is the same as the shortest path shown in the second column.The original topology generates links(a,c)and(b,d)under the action of the AddLink algorithm.At this time,the shortest path of the node toa-c,b-d,c-a,d-bchanges,as shown in the third column.It is continuing to calculate the previous topology by the DeleteLink algorithm,the shortest path of the node toa-b,b-a,c-d,d-chas also changed,as shown in the fourth column.According to the path coincidence degree formula,the path coincidence degree of the backup path calculated by the optimized topology is 25%.It can be concluded from Tab.1 that the public link of the backup path obtained by the ERPBONT algorithm is greatly reduced,and the path coincidence degree decreases significantly.

    Figure 2:Algorithm example topology

    Table 1: The calculation steps and results of the ERPBONT algorithm on the topology of Fig.2

    Table 1:Continued

    3.5 Algorithm Complexity Analysis

    Theorem 1:The time complexity of the AddLink algorithm is:

    Proof:It takes min(T0,cd1)cycles to find the link set that needs to be added.In each cycle,it is necessary to find the structureG′through the for loop,so as to calculate the shortest path and path coincidence degree of all nodes ofG′.At the end of the for loop,the shortest path and path coincidence degree calculation is performed.The time complexity of this algorithm isTherefore,the time complexity of AddLink is min

    Theorem 2:The time complexity of the DeleteLink algorithm is:

    Proof:The same as the AddLink proof process.

    Theorem 3:The time complexity of the ERPBONT algorithm is:

    Proof: ERPBONT mainly includes five steps: (1)To construct an undirected connected graph,the time complexity is(2)AddLink and DeleteLink,the time complexity is 2×min(T0,cd1)×(3)The shortest path algorithm and the path coincidence degree algorithm, the time complexity isTherefore, the time complexity of ERPBONT is: 2×min

    4 Experiment Analysis

    This section uses experiments to evaluate the path coincidence degree of ERPBONT, AddLink and DeleteLink.The following first introduces the network topology used in the experiment,and then describes the performance of different algorithms.

    4.1 Network Topology

    This paper uses three types of network topologies for experiments, the real network topology,the network topology published by Rocketfuel and the network topology generated by Brite.The real network topology includes Abilene,NJLATA,TORONTO and USLD[27].The topologies published by Rocketfuel [27,28] are 1755 (Ebone), 3257 (Tiscali), and 3967 (Exodus).When using Brite to generate the topology, it is assumed that the link weights are symmetrical.Brite’s model is set to Waxman,the number of nodes is 50 to 1000,the values of alpha and beta are 0.15 and 0.2,respectively,and the average degree of nodes is set between 2 and 10.The mode is set to the router,the node position obeys heavy-tail distribution,the size of the link bandwidth is between 10 and 1024,and the link cost is the inverse of the bandwidth.

    The real topology used in the experiment is shown in Tab.2:

    Table 2: Real topology

    The Rocketfuel topology used in the experiment is shown in Tab.3:

    Table 3: Rocketfuel topology

    The Brite topology used in the experiment is shown in Tab.4:

    Table 4: Brite topology

    Table 4:Continued

    4.2 Path Coincidence Degree

    Figs.3 and 4 show the path coincidence degree corresponding to different algorithms in the real network topology and the measured network topology.As shown in Figs.3 and 4,in the real topology and measurement network topology,the ERPBONT algorithm’s performance is considerably better than the AddLink algorithm and the DeleteLink algorithm.Compared with the two algorithms,the path coincidence degree of the ERPBONT algorithm is reduced by 23.6%and 6.9%,respectively,and on the Rocketfule topology, the path coincidence degree of the ERPBONT algorithm is reduced by 17.8%and 3.7%,respectively.

    Figure 3:Comparison of path coincidence degree of three algorithms in real topology

    Fig.5 shows how the path coincidence degree of different algorithms changes with the size of the network topology when the average degree of nodes is 4 in the network.Fig.6 shows the relationship between the path coincidence degree of different algorithms and the average degree of network nodes when the network topology size is 200.It can be seen from Fig.5 that ERPBONT reduces the path overlap by 18.9%and 5.8%,respectively,compared with the AddLink algorithm and the DeleteLink algorithm.It can be seen from Fig.6 that the path coincidence degree of ERPBONT is 9.3%and 2.1%lower than that of the AddLink algorithm and the DeleteLink algorithm,respectively.

    Figure 4:Comparison of path coincidence degree of three algorithms in Rocketfuel topology

    Figure 5:Comparison of path coincidence degree of three algorithms in Brite degree 4 topology

    Figure 6:Comparison of path coincidence degree of three algorithms in Brite node 200 topology

    5 Conclusion and Future Work

    The redundancy problem of backup path calculated by the existing routing protection methods is serious.The use of path coincidence degree as a measurement index is not considered in the selection of backup path, resulting in a large number of duplicate links between backup path and best path,which greatly reduces the routing availability.In order to solve the above problem,this paper proposes a routing protection method ERPBONT based on optimizing network topology.ERPBONT can be employed in the following scenarios, such as Voice over Internet Protocol (VoIP), online stock trading, remote surgery, video streaming, instant messaging, and so forth.ERPBONT takes the path coincidence degree as the index to select the backup path, calculates only one backup path for all source-destination pairs.ERPBONT has the minimum path coincidence degree between the backup path and the original path,which greatly improves the routing availability.According to the simulation experiment,it can be seen that the path coincidence degree of the backup path calculated by ERPBONT algorithm under the real topology and the simulated topology is significantly reduced.

    At present,ERPBONT algorithm only stays in the stage of calculating the backup path to improve the routing availability.In the future, we will test the algorithm in a real network, and apply the algorithm ERPBONT to SDN network.We also consider how to improve ERPBONT to deal with the single node failures and concurrent failures scenarios in the network.

    Funding Statement:This work is supported by the Hainan Provincial Natural Science Foundation of China (620RC562), the Natural Science Foundation of Shanxi Province (Grant Nos.20210302123444,20210302123455), the China University industry university research innovation fund(No.2021FNA02009),the Open Project Program of the Key Laboratory of Embedded System and Service Computing of Ministry of Education (Tongji University)ESSCKF 2021-04, the National Natural Science Foundation of China (Grant Nos.61702315, 61802092), the Applied Basic Research Plan of Shanxi Province(No.201901D211168),the Program of Hainan Association for Science and Technology Plans to Youth R&D Innovation (QCXM201910), and the Key R&D Program(International Science and Technology Cooperation Project)of Shanxi Province China(No.201903D421003).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the study.

    午夜视频精品福利| 久99久视频精品免费| 一个人免费在线观看的高清视频| 天堂动漫精品| 国产又色又爽无遮挡免费看| 久久天堂一区二区三区四区| 88av欧美| 成人免费观看视频高清| 99re在线观看精品视频| 免费看a级黄色片| 精品一区二区三卡| 久久精品国产亚洲av香蕉五月| 在线观看免费视频网站a站| 村上凉子中文字幕在线| 男女下面进入的视频免费午夜 | 女人爽到高潮嗷嗷叫在线视频| 久久精品国产99精品国产亚洲性色 | 免费久久久久久久精品成人欧美视频| av网站在线播放免费| av网站在线播放免费| 国产aⅴ精品一区二区三区波| bbb黄色大片| 中出人妻视频一区二区| 国内久久婷婷六月综合欲色啪| 久久久精品国产亚洲av高清涩受| 亚洲欧美一区二区三区黑人| 国产精品1区2区在线观看.| 国产亚洲欧美在线一区二区| 涩涩av久久男人的天堂| 一区二区三区国产精品乱码| 级片在线观看| 亚洲一区高清亚洲精品| 国产成人av教育| 91国产中文字幕| 欧美日韩亚洲综合一区二区三区_| 国产一卡二卡三卡精品| 日韩精品青青久久久久久| 变态另类成人亚洲欧美熟女 | 国产精品爽爽va在线观看网站 | 成人免费观看视频高清| 久久精品国产亚洲av香蕉五月| 一级毛片精品| 91老司机精品| 国产97色在线日韩免费| 亚洲av第一区精品v没综合| 午夜影院日韩av| 国产亚洲av高清不卡| 亚洲自偷自拍图片 自拍| 看黄色毛片网站| 亚洲欧美日韩高清在线视频| 国产精品一区二区免费欧美| 久久青草综合色| 自拍欧美九色日韩亚洲蝌蚪91| 国产精品一区二区三区四区久久 | 久久亚洲精品不卡| 最好的美女福利视频网| 村上凉子中文字幕在线| 伊人久久大香线蕉亚洲五| 欧美成人午夜精品| 欧美日韩av久久| 美女福利国产在线| 黑人欧美特级aaaaaa片| 欧美日韩亚洲国产一区二区在线观看| 久久久国产成人免费| 一级作爱视频免费观看| 午夜老司机福利片| 免费不卡黄色视频| 亚洲欧美激情综合另类| 久久这里只有精品19| 免费不卡黄色视频| 可以免费在线观看a视频的电影网站| 无人区码免费观看不卡| 免费在线观看亚洲国产| 国产欧美日韩一区二区精品| a在线观看视频网站| 国产av又大| 18禁黄网站禁片午夜丰满| 欧美日韩福利视频一区二区| 国产成人av教育| 成熟少妇高潮喷水视频| 欧美黄色淫秽网站| 久久久久国产一级毛片高清牌| 97超级碰碰碰精品色视频在线观看| 一级,二级,三级黄色视频| 91成年电影在线观看| 99热只有精品国产| 一区二区日韩欧美中文字幕| 婷婷六月久久综合丁香| 欧美在线黄色| 亚洲美女黄片视频| 97碰自拍视频| 久久 成人 亚洲| 色婷婷av一区二区三区视频| 午夜激情av网站| 欧美中文综合在线视频| 免费观看人在逋| 日本黄色视频三级网站网址| 一本综合久久免费| 精品国产乱子伦一区二区三区| 亚洲国产欧美一区二区综合| 欧美日韩中文字幕国产精品一区二区三区 | 一进一出好大好爽视频| 欧美日韩黄片免| 麻豆一二三区av精品| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲熟妇中文字幕五十中出 | 老熟妇仑乱视频hdxx| 淫妇啪啪啪对白视频| 夜夜夜夜夜久久久久| 他把我摸到了高潮在线观看| 精品电影一区二区在线| 国产伦一二天堂av在线观看| 久久久久久亚洲精品国产蜜桃av| 国产一区二区在线av高清观看| 国产av在哪里看| 99国产精品一区二区三区| 韩国av一区二区三区四区| 久久热在线av| 在线av久久热| 久99久视频精品免费| 1024视频免费在线观看| 亚洲七黄色美女视频| 成人免费观看视频高清| 久久精品aⅴ一区二区三区四区| 日韩精品青青久久久久久| 12—13女人毛片做爰片一| 亚洲色图av天堂| 国产99久久九九免费精品| av网站在线播放免费| 性少妇av在线| 十八禁人妻一区二区| 51午夜福利影视在线观看| 亚洲男人天堂网一区| av中文乱码字幕在线| 亚洲色图av天堂| 精品高清国产在线一区| 18美女黄网站色大片免费观看| 成人三级黄色视频| 国产成人精品久久二区二区免费| 精品久久久久久成人av| av超薄肉色丝袜交足视频| 五月开心婷婷网| 日韩中文字幕欧美一区二区| 欧美最黄视频在线播放免费 | 国产成人免费无遮挡视频| 黑丝袜美女国产一区| 老司机靠b影院| 久久香蕉精品热| 亚洲av五月六月丁香网| 美国免费a级毛片| 美女 人体艺术 gogo| 啪啪无遮挡十八禁网站| 久久久久久大精品| www.自偷自拍.com| 一边摸一边做爽爽视频免费| 国产真人三级小视频在线观看| www.熟女人妻精品国产| 日本wwww免费看| 国产精品av久久久久免费| 99国产精品免费福利视频| 午夜福利影视在线免费观看| 久久久久久亚洲精品国产蜜桃av| 18美女黄网站色大片免费观看| 日韩 欧美 亚洲 中文字幕| 日日爽夜夜爽网站| 18禁黄网站禁片午夜丰满| 久久久久九九精品影院| 18禁美女被吸乳视频| 日韩视频一区二区在线观看| 他把我摸到了高潮在线观看| 黄网站色视频无遮挡免费观看| 麻豆一二三区av精品| 久久久国产一区二区| x7x7x7水蜜桃| 日本vs欧美在线观看视频| 精品福利永久在线观看| 一a级毛片在线观看| 女人高潮潮喷娇喘18禁视频| 妹子高潮喷水视频| 热99re8久久精品国产| a级毛片在线看网站| www.999成人在线观看| 宅男免费午夜| 他把我摸到了高潮在线观看| 国产成人系列免费观看| 97碰自拍视频| 在线免费观看的www视频| 久久精品国产亚洲av香蕉五月| av免费在线观看网站| 久久伊人香网站| 日韩一卡2卡3卡4卡2021年| 99久久国产精品久久久| 久久性视频一级片| 18美女黄网站色大片免费观看| 国产一区在线观看成人免费| 一级片免费观看大全| 午夜久久久在线观看| av网站免费在线观看视频| 两个人看的免费小视频| 欧美色视频一区免费| 亚洲人成电影观看| 午夜精品在线福利| 三级毛片av免费| 18禁黄网站禁片午夜丰满| 大香蕉久久成人网| 久久久精品欧美日韩精品| 婷婷六月久久综合丁香| 国产成人系列免费观看| 午夜视频精品福利| 不卡一级毛片| 精品国产亚洲在线| 午夜精品国产一区二区电影| 亚洲va日本ⅴa欧美va伊人久久| 啦啦啦在线免费观看视频4| 国产aⅴ精品一区二区三区波| 嫁个100分男人电影在线观看| 国产精品日韩av在线免费观看 | 色精品久久人妻99蜜桃| 日韩免费av在线播放| 国产成人欧美在线观看| 91麻豆av在线| av福利片在线| 欧美人与性动交α欧美精品济南到| 51午夜福利影视在线观看| 黄频高清免费视频| 亚洲人成77777在线视频| 90打野战视频偷拍视频| www.999成人在线观看| 国产免费av片在线观看野外av| 国产av在哪里看| 日韩欧美国产一区二区入口| 波多野结衣高清无吗| 国产av在哪里看| 村上凉子中文字幕在线| 久久狼人影院| 国产精品影院久久| 午夜影院日韩av| 波多野结衣av一区二区av| 国产真人三级小视频在线观看| 无遮挡黄片免费观看| 成人av一区二区三区在线看| 在线观看66精品国产| 无限看片的www在线观看| 亚洲专区字幕在线| 亚洲自偷自拍图片 自拍| 丝袜美足系列| 一级毛片高清免费大全| 久久国产亚洲av麻豆专区| xxxhd国产人妻xxx| 两个人看的免费小视频| 成人18禁在线播放| 一区二区三区精品91| 国产三级黄色录像| 亚洲中文av在线| 最好的美女福利视频网| 99国产极品粉嫩在线观看| 纯流量卡能插随身wifi吗| 国产精品99久久99久久久不卡| 国产99久久九九免费精品| svipshipincom国产片| 国产精品电影一区二区三区| 夫妻午夜视频| 欧美日韩亚洲国产一区二区在线观看| 亚洲av第一区精品v没综合| 黄频高清免费视频| 十八禁人妻一区二区| 99热国产这里只有精品6| 美女 人体艺术 gogo| 欧美日韩视频精品一区| 在线观看免费午夜福利视频| 在线av久久热| 色综合欧美亚洲国产小说| 欧美另类亚洲清纯唯美| 久久青草综合色| 国产精品野战在线观看 | 在线国产一区二区在线| 精品久久久精品久久久| 久久久久久久久中文| 欧美日韩av久久| 激情视频va一区二区三区| 三上悠亚av全集在线观看| 日韩欧美国产一区二区入口| 日韩 欧美 亚洲 中文字幕| 欧美黑人欧美精品刺激| 亚洲精品国产精品久久久不卡| 成年人免费黄色播放视频| av在线天堂中文字幕 | www.精华液| 亚洲成人国产一区在线观看| 国产一区二区在线av高清观看| 亚洲国产毛片av蜜桃av| 亚洲第一av免费看| 在线观看www视频免费| 嫩草影视91久久| 久久狼人影院| 88av欧美| 亚洲狠狠婷婷综合久久图片| 中亚洲国语对白在线视频| 99精品久久久久人妻精品| www.精华液| 在线观看免费高清a一片| 久久久久国产精品人妻aⅴ院| 国产精品一区二区精品视频观看| 777久久人妻少妇嫩草av网站| 国产精品永久免费网站| 国产精品野战在线观看 | 久久久久久人人人人人| 国产精品一区二区免费欧美| 亚洲国产精品合色在线| 免费少妇av软件| 中文字幕精品免费在线观看视频| 国产精品野战在线观看 | 久久精品91蜜桃| 丰满饥渴人妻一区二区三| 新久久久久国产一级毛片| 婷婷六月久久综合丁香| 国产一区二区三区综合在线观看| 欧美老熟妇乱子伦牲交| 一进一出抽搐gif免费好疼 | 国产高清视频在线播放一区| 在线观看一区二区三区激情| 亚洲av成人不卡在线观看播放网| 无遮挡黄片免费观看| 妹子高潮喷水视频| 欧美不卡视频在线免费观看 | 国产又色又爽无遮挡免费看| 18禁国产床啪视频网站| 日韩视频一区二区在线观看| 母亲3免费完整高清在线观看| 国产97色在线日韩免费| 亚洲色图综合在线观看| 啦啦啦在线免费观看视频4| 欧美日韩av久久| 两性午夜刺激爽爽歪歪视频在线观看 | 叶爱在线成人免费视频播放| 高清毛片免费观看视频网站 | 一个人免费在线观看的高清视频| 日韩视频一区二区在线观看| 午夜免费激情av| 久久久国产成人精品二区 | 日韩av在线大香蕉| 黄色视频,在线免费观看| 中亚洲国语对白在线视频| 久久精品国产亚洲av高清一级| 亚洲九九香蕉| 欧美色视频一区免费| 一级毛片高清免费大全| 99国产精品一区二区三区| 纯流量卡能插随身wifi吗| 午夜影院日韩av| 一进一出抽搐gif免费好疼 | 国产精品久久久av美女十八| 国产一卡二卡三卡精品| 少妇裸体淫交视频免费看高清 | 精品一品国产午夜福利视频| 国产在线观看jvid| 久久久国产欧美日韩av| 亚洲一区二区三区色噜噜 | 19禁男女啪啪无遮挡网站| 美女 人体艺术 gogo| 一边摸一边抽搐一进一出视频| xxxhd国产人妻xxx| 成年版毛片免费区| 日本精品一区二区三区蜜桃| 97超级碰碰碰精品色视频在线观看| 亚洲精品国产一区二区精华液| 国产日韩一区二区三区精品不卡| 亚洲欧美一区二区三区久久| 亚洲午夜精品一区,二区,三区| 亚洲男人的天堂狠狠| 高潮久久久久久久久久久不卡| 国产精品一区二区免费欧美| 757午夜福利合集在线观看| 日本黄色视频三级网站网址| 久久亚洲精品不卡| 亚洲欧美一区二区三区黑人| 后天国语完整版免费观看| 一进一出抽搐动态| 亚洲欧美精品综合久久99| 91在线观看av| 一级a爱视频在线免费观看| 成人三级黄色视频| 性色av乱码一区二区三区2| 中出人妻视频一区二区| 国产伦一二天堂av在线观看| 亚洲视频免费观看视频| 国产伦人伦偷精品视频| 人人妻人人澡人人看| 成人手机av| 中文字幕人妻熟女乱码| 91老司机精品| 黄网站色视频无遮挡免费观看| 亚洲成人久久性| 手机成人av网站| 韩国精品一区二区三区| 女性生殖器流出的白浆| 久久久久久久午夜电影 | 在线永久观看黄色视频| 一进一出好大好爽视频| 亚洲av第一区精品v没综合| 大码成人一级视频| 美女扒开内裤让男人捅视频| 一区二区三区国产精品乱码| 老熟妇仑乱视频hdxx| 悠悠久久av| 日韩欧美三级三区| 午夜免费激情av| 欧美久久黑人一区二区| 亚洲精品在线美女| 在线av久久热| 色婷婷av一区二区三区视频| 午夜久久久在线观看| 高潮久久久久久久久久久不卡| 欧美大码av| 精品电影一区二区在线| 亚洲自拍偷在线| 国产精品九九99| 在线观看日韩欧美| 在线播放国产精品三级| 老司机深夜福利视频在线观看| 日日摸夜夜添夜夜添小说| 国产精品免费视频内射| 久久 成人 亚洲| 一本大道久久a久久精品| 久久久久国产精品人妻aⅴ院| 久久久国产欧美日韩av| a级片在线免费高清观看视频| 真人做人爱边吃奶动态| 久久精品亚洲精品国产色婷小说| 国产无遮挡羞羞视频在线观看| 亚洲成人久久性| 国产精品一区二区精品视频观看| 悠悠久久av| 国产亚洲精品久久久久5区| 成年女人毛片免费观看观看9| 亚洲欧美精品综合一区二区三区| 欧美日韩亚洲综合一区二区三区_| 国产aⅴ精品一区二区三区波| 纯流量卡能插随身wifi吗| 精品一品国产午夜福利视频| 欧美日韩中文字幕国产精品一区二区三区 | 国产激情欧美一区二区| 亚洲自拍偷在线| 亚洲片人在线观看| 日韩欧美一区二区三区在线观看| 日本a在线网址| 中出人妻视频一区二区| 无限看片的www在线观看| 国产真人三级小视频在线观看| 亚洲欧美一区二区三区黑人| 天堂影院成人在线观看| 黄色 视频免费看| 黑丝袜美女国产一区| 久久中文字幕人妻熟女| 国产精品美女特级片免费视频播放器 | 亚洲视频免费观看视频| 男人操女人黄网站| 精品欧美一区二区三区在线| 免费日韩欧美在线观看| 亚洲av成人不卡在线观看播放网| 色综合站精品国产| 老鸭窝网址在线观看| 日日摸夜夜添夜夜添小说| 伊人久久大香线蕉亚洲五| 中文字幕人妻丝袜制服| 亚洲欧洲精品一区二区精品久久久| 亚洲五月色婷婷综合| 亚洲片人在线观看| 大香蕉久久成人网| 99精品在免费线老司机午夜| 岛国视频午夜一区免费看| 国产高清videossex| 国产主播在线观看一区二区| 亚洲成a人片在线一区二区| 99久久人妻综合| 日本wwww免费看| 日韩欧美国产一区二区入口| 一进一出抽搐动态| 日本免费一区二区三区高清不卡 | 夜夜爽天天搞| 制服诱惑二区| 免费日韩欧美在线观看| 国产成人精品在线电影| 亚洲中文日韩欧美视频| 天天添夜夜摸| 99国产精品一区二区三区| 日日干狠狠操夜夜爽| 不卡av一区二区三区| 69av精品久久久久久| 手机成人av网站| 亚洲国产欧美一区二区综合| 国产精品98久久久久久宅男小说| 91av网站免费观看| 午夜91福利影院| 国产91精品成人一区二区三区| av网站在线播放免费| 亚洲成人精品中文字幕电影 | 97人妻天天添夜夜摸| 精品人妻1区二区| 亚洲成av片中文字幕在线观看| 亚洲激情在线av| 久久久久国内视频| 窝窝影院91人妻| 国产av在哪里看| 亚洲,欧美精品.| 午夜免费观看网址| 久久这里只有精品19| 水蜜桃什么品种好| 久久久水蜜桃国产精品网| 99久久国产精品久久久| 女人爽到高潮嗷嗷叫在线视频| 少妇 在线观看| 丰满的人妻完整版| 久久这里只有精品19| 免费在线观看视频国产中文字幕亚洲| 国产又色又爽无遮挡免费看| 一区在线观看完整版| 亚洲情色 制服丝袜| 久久精品91蜜桃| 日本免费a在线| 中文字幕最新亚洲高清| 999久久久精品免费观看国产| 欧美老熟妇乱子伦牲交| 一级片'在线观看视频| 国产高清视频在线播放一区| 欧美色视频一区免费| 波多野结衣av一区二区av| 亚洲精华国产精华精| 9热在线视频观看99| 欧美成人性av电影在线观看| 久久精品亚洲熟妇少妇任你| 中文字幕另类日韩欧美亚洲嫩草| 国产成人免费无遮挡视频| 欧美日本中文国产一区发布| 男女高潮啪啪啪动态图| 国产成年人精品一区二区 | 国产野战对白在线观看| 久久热在线av| 男女之事视频高清在线观看| 身体一侧抽搐| 熟女少妇亚洲综合色aaa.| 99在线人妻在线中文字幕| 天堂俺去俺来也www色官网| 久久精品91无色码中文字幕| 精品国产超薄肉色丝袜足j| 69av精品久久久久久| 三上悠亚av全集在线观看| 午夜精品久久久久久毛片777| 天天躁狠狠躁夜夜躁狠狠躁| 色综合欧美亚洲国产小说| 99精品欧美一区二区三区四区| 美女扒开内裤让男人捅视频| 久久久久亚洲av毛片大全| 久久久精品国产亚洲av高清涩受| 一二三四在线观看免费中文在| 99国产精品一区二区蜜桃av| 欧美不卡视频在线免费观看 | 曰老女人黄片| 色精品久久人妻99蜜桃| 久久久久精品国产欧美久久久| 三级毛片av免费| 亚洲专区中文字幕在线| e午夜精品久久久久久久| 天天影视国产精品| 自拍欧美九色日韩亚洲蝌蚪91| 波多野结衣av一区二区av| 国产激情久久老熟女| 久久中文看片网| 亚洲精品av麻豆狂野| 欧美午夜高清在线| 一级毛片女人18水好多| 亚洲av电影在线进入| 欧美日韩av久久| 久久久久国内视频| 老熟妇仑乱视频hdxx| 国产区一区二久久| 婷婷六月久久综合丁香| 脱女人内裤的视频| 极品教师在线免费播放| a级毛片黄视频| 超色免费av| 999精品在线视频| 国产成人av教育| 国产男靠女视频免费网站| 国产精品久久电影中文字幕| 国产欧美日韩一区二区三| 一级毛片精品| 日本免费a在线| 亚洲va日本ⅴa欧美va伊人久久| 69av精品久久久久久| 亚洲精品国产区一区二| 在线观看午夜福利视频| 国产成人欧美| av片东京热男人的天堂| 国产精品影院久久| tocl精华| 一边摸一边做爽爽视频免费| 99在线人妻在线中文字幕| 中文字幕高清在线视频| 久久国产精品男人的天堂亚洲| 日韩av在线大香蕉| 亚洲熟女毛片儿| 亚洲精华国产精华精| 老司机靠b影院| 大香蕉久久成人网| 久久久久久久久中文| 性色av乱码一区二区三区2| 精品第一国产精品| 精品人妻在线不人妻| 制服诱惑二区| 成年版毛片免费区| 国产免费现黄频在线看| 成人亚洲精品av一区二区 | 亚洲精品国产区一区二| 热99re8久久精品国产|