On Reducing Response Time for VPN Traffic March 2002
نویسندگان
چکیده
A successful migration from traditional private networks (PNs) to virtual private networks (VPNs) depends on the ability of VPNs to offer similar quality of service (QoS) guarantees. To approach this goal, we propose to use priority scheduling based on flow size differentiation at the edge devices of the VPN. We evaluate the shortest elapsed time (SET) scheduling policy and compare it to different scheduling policies for both, high and low variance flow size distributions. The results show that SET is a more suitable policy than the traditional FIFO policy in terms of minimizing the response time. In particular, SET offers significantly lower mean response time for flow sizes with a high variance than flow sizes with a low variance. We also propose an implementation of SET for VPN customer edge (CE) devices.
منابع مشابه
Evaluating the importance of dynamic allocation and routing of rescuers in reducing response time
Due to delay in receiving emergency medical services, a high number of injured people and patients annually lose their lives. Determining the medical service area and correct routing of rescuing operation is influential on the reduction of rescuers’ response time. Changing the traffic flow leads to change of medical service area. Therefore, it is expected that by observing changing traffic, the...
متن کاملOn Reducing Response Time for VPN Traffic
A successful migration from traditional private networks (PNs) to virtual private networks (VPNs) depends on the ability of VPNs to offer similar quality of service (QoS) guarantees. To approach this goal, we propose to use priority scheduling based on flow size differentiation at the edge devices of the VPN. We evaluate the shortest elapsed time (SET) scheduling policy and compare it to differ...
متن کاملRestoration Algorithms for Virtual Private Networks in the Hose Model
A Virtual Private Network (VPN) aims to emulate the services provided by a private network over the shared Internet. The endpoints of a VPN are connected using abstractions such as Virtual Channels (VCs) of ATM or Label Switching Paths (LSPs) of MPLS technologies. Reliability of an end-to-end VPN connection depends on the reliability of the links and nodes in the fixed path that it traverses in...
متن کاملRouting and Provisioning VPNs based on Hose Traffic Models and/or Constraints
In this paper we investigate various questions associated with routing and provisioning virtual private networks (VPNs) based on hose traffic models or constraints, i.e., using aggregate (hose) traffic characterizations in/out of VPN end-points. This appears to be a promising simple approach to dealing with traffic engineering for VPNs. We evaluate the possible efficiencies derived from spatial...
متن کاملQoS-based Virtual Private Network Design for an MPLS network
In this paper, a VPN design model is proposed for the Next Generation Internet (NGI). With the use of MultiProtocol Label Switching (MPLS) in a backbone network, it is possible to create multiple logical sink-trees (directed multipoint-to-point trees ending at one exit node) carrying traffic of multiple VPNs. This makes the VPN design problem with MPLS different from those of circuit-switched...
متن کامل