Configuration of Protected Virtual Private Networks
نویسندگان
چکیده
The route configuration of Virtual Private Networks (VPNs) over a given physical network is addressed considering the protection. We analyze protection at two different layers, first when the operator protects the virtual links of the VPN and second when the protection is done within the VPN. The problem is formulated as a general model without specializing to any particular network type, however the proposed methods can be used for various SDH, ATM, IP, MPLS and WR-DWDM Networks. The service demands of VPNs are characterized by the bandwidth requirements of node-pairs. Given the capacity matrix of the physical network and the traffic demand matrices of the VPNs, the protected VPN configuration is sought which minimizes the number of links used by the VPNs, and results in global optimum. Numerical results from calculations on sample networks show the properties of the protection at different layers.
منابع مشابه
A survey on automatic configuration of virtual private networks
Virtual private networks (VPN) offer a secure data exchange over public networks. Despite being cheaper than leased lines, growing sizes and dynamic behavior of VPN nodes, e.g., for mobility or reasons of denial-of-service-attacks, make a manual configuration of large, dynamic VPN expensive. Consequently, a number of different VPN auto-configuration approaches have been invented and partially d...
متن کاملHigh-level lock-less programming for multi-core
class ff node { protected: virtual bool push(void∗ data) { return qout−>push(data); } virtual bool pop(void∗∗ data) { return qin−>pop(data); } public: virtual void∗ svc(void ∗ task) = 0; virtual int svc init () { return 0; }; virtual void svc end() {} ... private: SPSC∗ qin; SPSC∗ qout; }; Arbitrary streaming networks layer implements the ff_node, i.e. the building block of networks and serves ...
متن کاملIntegrity for Virtual Private Routed Networks
The term Virtual Private Network (VPN) encompasses a wide array of diverse technologies and network architectures. All VPNs should provide users with the isolation and security associated with private networks, but at lower costs made possible by implementing these networks over some type of shared infrastructure. Provider provisioned VPN allow enterprises to outsource their private backbone ne...
متن کاملUsing zero configuration technology for IP addressing in optical networks
Host configuration in optical networks is usually done by hand. In this paper we propose to use zero configuration techniques, including self-assigned IP addresses and multicast DNS to do this automatically. The proposed technology is designed for small networks without central control, and can be applied to optical private networks as long as there is no router in between the end-hosts. c © 20...
متن کاملShared Protection of Virtual Private Networks with Heuristic Methods
In our paper we analysed algorithms that seek the optimal routing configuration in backbone networks with capacity constraints. We investigated a special case when multiple full mesh demand sets (forming Virtual Private Networks (VPNs)) have to be built. We examined the pro-active path based shared protection scheme and investigated heuristic algorithms to calculate the paths. We analysed two d...
متن کامل