Configuration of Protected Virtual Private Networks

نویسندگان

  • Markosz Maliosz
  • Tibor Cinkler
چکیده

The route configuration of Virtual Private Networks (VPNs) over a given physical network is addressed considering the protection. We analyze protection at two different layers, first when the operator protects the virtual links of the VPN and second when the protection is done within the VPN. The problem is formulated as a general model without specializing to any particular network type, however the proposed methods can be used for various SDH, ATM, IP, MPLS and WR-DWDM Networks. The service demands of VPNs are characterized by the bandwidth requirements of node-pairs. Given the capacity matrix of the physical network and the traffic demand matrices of the VPNs, the protected VPN configuration is sought which minimizes the number of links used by the VPNs, and results in global optimum. Numerical results from calculations on sample networks show the properties of the protection at different layers.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey on automatic configuration of virtual private networks

Virtual private networks (VPN) offer a secure data exchange over public networks. Despite being cheaper than leased lines, growing sizes and dynamic behavior of VPN nodes, e.g., for mobility or reasons of denial-of-service-attacks, make a manual configuration of large, dynamic VPN expensive. Consequently, a number of different VPN auto-configuration approaches have been invented and partially d...

متن کامل

High-level lock-less programming for multi-core

class ff node { protected: virtual bool push(void∗ data) { return qout−>push(data); } virtual bool pop(void∗∗ data) { return qin−>pop(data); } public: virtual void∗ svc(void ∗ task) = 0; virtual int svc init () { return 0; }; virtual void svc end() {} ... private: SPSC∗ qin; SPSC∗ qout; }; Arbitrary streaming networks layer implements the ff_node, i.e. the building block of networks and serves ...

متن کامل

Integrity for Virtual Private Routed Networks

The term Virtual Private Network (VPN) encompasses a wide array of diverse technologies and network architectures. All VPNs should provide users with the isolation and security associated with private networks, but at lower costs made possible by implementing these networks over some type of shared infrastructure. Provider provisioned VPN allow enterprises to outsource their private backbone ne...

متن کامل

Using zero configuration technology for IP addressing in optical networks

Host configuration in optical networks is usually done by hand. In this paper we propose to use zero configuration techniques, including self-assigned IP addresses and multicast DNS to do this automatically. The proposed technology is designed for small networks without central control, and can be applied to optical private networks as long as there is no router in between the end-hosts. c © 20...

متن کامل

Shared Protection of Virtual Private Networks with Heuristic Methods

In our paper we analysed algorithms that seek the optimal routing configuration in backbone networks with capacity constraints. We investigated a special case when multiple full mesh demand sets (forming Virtual Private Networks (VPNs)) have to be built. We examined the pro-active path based shared protection scheme and investigated heuristic algorithms to calculate the paths. We analysed two d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001