Towards a Scalable and Flexible Architecture for Virtual Private Networks
نویسندگان
چکیده
Virtual Private Networks (VPNs) are commonly used to provide secure connectivity over public networks. VPNs use tunnels to provide encryption, compression, and authentication functions, which are identically applied to every packet passing through them. However, this behavior may be overly rigid in many situations where the applications require different functions to be applied to different parts of their streams. Current VPNs are unable to offer such differential treatment, posing a heavy computational burden on edge routers, reducing their flexibility and degrading network performance. Additionally, the administrative cost of maintaining these tunnels is as high as O(N) for an N node VPN. In this paper, we propose and evaluate a flexible VPN architecture (called Flexi-Tunes) where within a single VPN tunnel, different VPN functions are applied to different packet streams. Flexi-Tunes also replaces the traditional point-to-point tunnels with packet switched tunnels that improve scalability by reducing administrative costs to O(N). Simulation of this enhanced model demonstrates 170% improvement in bandwidth and 40 times improvement in end-
منابع مشابه
Dynamic configuration and collaborative scheduling in supply chains based on scalable multi-agent architecture
Due to diversified and frequently changing demands from customers, technological advances and global competition, manufacturers rely on collaboration with their business partners to share costs, risks and expertise. How to take advantage of advancement of technologies to effectively support operations and create competitive advantage is critical for manufacturers to survive. To respond to these...
متن کاملThe Case for Enterprise-Ready Virtual Private Clouds
Cloud computing platforms such as Amazon EC2 provide customers with flexible, on demand resources at low cost. However, while existing offerings are useful for providing basic computation and storage resources, they fail to provide the security and network controls that many customers would like. In this work we argue that cloud computing has a great potential to change how enterprises run and ...
متن کاملTarget Tracking Based on Virtual Grid in Wireless Sensor Networks
One of the most important and typical application of wireless sensor networks (WSNs) is target tracking. Although target tracking, can provide benefits for large-scale WSNs and organize them into clusters but tracking a moving target in cluster-based WSNs suffers a boundary problem. The main goal of this paper was to introduce an efficient and novel mobility management protocol namely Target Tr...
متن کاملImportance of Multicast Virtual Private Networks based on RFC 2547
The Multi-protocol Label Switching is one of the proposed technologies useful for traffic engineering in the specific aspects of measurement and control of Internet traffic and virtual Private network (VPN) is a concept that significant on the future of business communication, it replace existing private network with flexible architecture that is easily manage and at a same time it provide enha...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کامل