The Community for Technology Leaders
RSS Icon
Issue No.01 - Jan. (2013 vol.24)
pp: 184-197
Ravishankar Ravindran , Carleton University, Ottawa
Changcheng Huang , Carleton University, Ottawa
Krishnaiya Thulasiraman , University of Oklahoma, Norman
VPN service providers (VSP) and IP-VPN customers have traditionally maintained service demarcation boundaries between their routing and signaling entities. This has resulted in the VPNs viewing the VSP network as an opaque entity and therefore limiting any meaningful interaction between the VSP and the VPNs. The purpose of this research is to address this issue by enabling a VSP to share its core topology information with the VPNs through a novel topology abstraction (TA) service which is both practical and scalable in the context of managed IP-VPNs. TA service provides tunable visibility of state of the VSP's network leading to better VPN performance. A key challenge of the TA service is to generate TA with relevant network resource information for each VPN in an accurate and fair manner. We develop three decentralized schemes for generating TAs with different performance characteristics. These decentralized schemes achieve improved call performance, fair resource sharing for VPNs, and higher network utilization for the VSP. We validate the idea of the VPN TA service and study the performance of the proposed techniques using various simulation scenarios over several topologies.
Virtual private networks, Topology, Network topology, Routing, Educational institutions, IP networks, Subscriptions, topology abstraction, IP virtual private networks, managed IP-VPN service
Ravishankar Ravindran, Changcheng Huang, Krishnaiya Thulasiraman, "Topology Abstraction Service for IP-VPNs", IEEE Transactions on Parallel & Distributed Systems, vol.24, no. 1, pp. 184-197, Jan. 2013, doi:10.1109/TPDS.2012.27
[1] A. Nagarajan, "Generic Requirements for Provider Provisioned Virtual Private Networks (PPVPN)," RFC 3809, IETF, June 2004.
[2] P. Knight and C. Lewis, "Layer 2 and 3 Virtual Private Networks: Taxonomy Technology and Standardization Efforts," IEEE Comm. Magazine, vol. 42, no. 6, pp. 124-131, June 2004.
[3] C.T. Chou, "Traffic Engineering for MPLS Based Virtual Private Networks," Proc. IEEE INFOCOM, pp. 110-115, June 2002.
[4] N.G. Duffield, P. Goyal, A. Greenberg, P. Mishra, K.K. Ramakrishnan, and J.E. van der Merwe, "Resource Management with Hoses: Point-to-Cloud Services for Virtual Private Networks," IEEE/ACM Trans. Networking, vol. 10, no. 5, pp. 679-692, Oct. 2002.
[5] A. Kumar, R. Rastogi, and A. Siberschatz, "Algorithms for Provisioning Virtual Private Networks in Host Model," IEEE/ACM Trans. Networking, vol.10, no.4, pp. 565-578, Aug. 2002.
[6] L. Zhang, J. Muppala, and S. Chanson, "Provisioning VPN in the Hose Model with Delay Requirements," Proc. Int'l Conf. Parallel Processing, pp. 211-218, June 2005.
[7] M. Kodialam, T.V. Lakshman, and S. Sengupta, "Traffic-Oblivious Routing for Guaranteed Bandwidth Performance," IEEE Comm. Magazine, vol. 45, no. 4, pp. 46-51, Apr. 2007.
[8] D. Mitra and I. Ziedins, "Hierarchical Virtual Partitioning: Algorithms for Virtual Private Networking," Proc. IEEE GLOBECOM, vol. 3, pp. 1784-1791, Nov. 1997.
[9] R. Garg and H. Saran, "Fair Bandwidth Sharing in Virtual Networks: A Capacity Resizing Approach," Proc. IEEE INFOCOM, vol. 1, pp. 255-264, Mar. 2000.
[10] R. Isaacs and I. Leslie, "Support for Resource-Assured and Dynamic Virtual Private Networks," IEEE J. Selected Areas in Comm., vol. 19, no. 3, pp. 460-472, Mar. 2001.
[11] CISCO Telepresence Service. Enterprise/Videotpqos.html#wp1045102, 2012.
[12] E. Rosen and Y. Rekter, "BGP/MPLS Virtual Private Networks," RFC 4364, IETF, Feb. 2006.
[13] P. Knight and H. Ould-Brahim, "Network Based IP-VPN Using Virtual Routers," draft-ietf-l3vpn-vpn-vr-03.txt, Internet Draft, IETF, Mar. 2006.
[14] E. Rosen and P. Psenak, "OSPF as the Provider/Customer Edge Protocol for BGP/MPLS IP Virtual Private Networks (VPNs)," RFC 4577, IETF, Jan. 2006.
[15] T. korkmaz and M. Krunz, "Source-Oriented Topology Aggregation with Multiple QoS Parameters in Hierarchical Networks," ACM Trans. Modeling and Computer Simulations, vol. 10, no. 4, pp. 295-325, Oct. 2000.
[16] Z. Wang and J. Crowcroft, "Quality-of-Service Routing for Supporting Multimedia Applications," IEEE J. Selected Areas in Comm., vol. 14, no.7, pp. 1228-1234, Sept. 1996.
[17] R.K. Ahuja, T.L. Magnanti, and J.B. Orlin, Network Fows: Theory, Algorithms, and Applications. Prentice-Hall, 1993.
[18] W. Kishimoto and M. Takeuchi, "On M-Route Flow in Networks," Proc. Singapore ICCS/ISITA '92, 1992.
[19] M.S. Kodialam, T.V. Laxman, and S. Sengupta, "Online Multicast Routing with Bandwidth Guarantees: A New Approach Using Multicast Network Flow," IEEE ACM Trans. Networking, vol. 11, no. 4, pp. 676-686, Aug. 2003.
[20] OPNET (Discrete Event Simulator),, 2012.
[21] B.M. Waxman, "Routing of Multipoint Connections," J. Selected Areas in Comm., vol. 6, pp. 1617-1622, Dec. 1988.
[22] K. Shing Ho and K. Wai Cheung, "Generalized Survivable Networks," IEEE/ACM Trans. Networking, vol. 15, no. 4, pp. 750-760, Aug. 2007.
[23] A.M. Law and W. David Kelton, Simulation Modelling and Analysis, third ed. McGraw Hill, 2000.
[24] P. Kokkinos and E. Vavarigos, "Resource Information Aggregation in Hierarchical Grid Networks," Proc. IEEE/ACM Symp. Cluster Computing and Grid (CCGRID), pp. 268-275, 2009.
[25] F.L. Verdi, M.F.M Aes, E.R.M Madeira, and A. Welin, "Using Virtualization to Provide Inter-Domain QoS Enabled Routing," J. Networks, vol. 2, no. 2, pp. 23-32, 2007.
[26] A. Udenze and K.M. Maie, "Dyna-Routing: Multi Criteria Reinforcement Learning Routing for Wireless Sensor Networks with Lossy Links," Ad Hoc and Sensor Wireless Networks, vol. 11, nos. 3/4, pp. 285-306, 2011.
[27] D. Traskas and J. Padget, "A Multi-Agent Systems Approach to Call-Centre Management," Int'l J. Parallel, Emergent and Distributed Systems, vol. 26, no. 5, pp. 347-367, 2011.
30 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool