1 / 40

Algorithms for Provisioning Virtual Private Networks in the Hose Model

Algorithms for Provisioning Virtual Private Networks in the Hose Model. Source: Sigcomm 2001, to appear in IEEE/ACM Transactions on Networking Author: Amit Kumar, Rajeev Rastogi, Avi Siberschatz and Bulent Yener. Outline. Introduction Provisioning algorithms Determination of link bandwidth

aqua
Download Presentation

Algorithms for Provisioning Virtual Private Networks in the Hose Model

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Algorithms for Provisioning Virtual Private Networks in the Hose Model Source: Sigcomm 2001, to appear in IEEE/ACM Transactions on Networking Author: Amit Kumar, Rajeev Rastogi, Avi Siberschatz and Bulent Yener

  2. Outline Introduction Provisioning algorithms Determination of link bandwidth Problem Statement Symmetric bandwidth case Asymmetric bandwidth case Experimental study

  3. Introduction A VPN establishes connectivity between a set of endpoints over a shared network infrastructure. Issues of offering customers with guaranteed bandwidth VPN service has received little attention. This paper addresses the problem of provisioning VPN services with bandwidth guarantees.

  4. Introduction Two popular models for providing QoS in VPNs: Pipe model Hose model

  5. Introduction In the pipe model, customer specifies QoS requirements between every pair of endpoints. This requires the customer to know the complete traffic matrix. However, the number of endpoints per VPN is constantly increasing and the communication patterns between endpoints are becoming increasingly complex. Predicting traffic characteristics between pairs of endpoint is a difficult task for customers.

  6. Introduction In the hose model, the customer specifies QoS requirements per endpoint and not every pair of endpoints. Each endpoint is associated with an ingress bandwidth and an egress bandwidth. Ingress bandwidth: the amount of incoming traffic from all the other endpoints into the endpoint. Egress bandwidth: the amount of traffic the endpoint can send to the other endpoints.

  7. Introduction The customer only needs to specify QoS requirement on a per endpoint basis. As a result, the hose model place less burden on VPN customers.

  8. Introduction The hose model provides customers with the the following advantages over the pipe model: Ease of Spec Flexibility Multiplexing Gain Characterization In order to to realize these benefits, efficient algorithms must be devised for provisioning hoses.

  9. Provisioning algorithms Hose provisioning algorithms need to set up paths between every pair of VPN endpoints such that the aggregate bandwidth reserved is minimum. The provisioning algorithms also need to reserve sufficient bandwidth to accommodate the traffic that meets ingress and egress bandwidth constraints.

  10. Provisioning algorithms Network Graph

  11. Provisioning algorithms Independent Shortest paths Link Sharing Among Paths Reserved bandwidth=8 Reserved bandwidth=6

  12. Provisioning algorithms In order to take advantage of the multiplexing gain due to hoses, this paper connects endpoints using a tree structure. A VPN tree has several benefits: Sharing of bandwidth reservation Scalability Simplicity of Routing Ease of Restoration

  13. Provisioning algorithms This paper develops algorithms for computing optimal VPN trees under four scenarios:

  14. Determination of link bandwidth Network graph

  15. Determination of link bandwidth A VPN tree 1000 1000 4 1000 1000 1 1 2 2 1 1

  16. Problem Statement Optimal VPN tree without link capacity constraints: Given a set of VPN endpoints, and their ingress and egress bandwidths, compute a VPN tree whose leaves are endpoints and for which aggregated bandwidth reserved is minimum. [3] has suggested that Steiner tree can be used to connect the VPN endpoints, however, it may be suboptimal.

  17. Problem Statement Network graph

  18. Problem Statement Steiner tree 1000 1001 1002 1001 1000 Reserved bandwidth=10008

  19. Problem Statement Optimal VPN tree 1000 1000 4 1000 1000 1 1 2 2 1 1 Reserved bandwidth=4012

  20. Problem Statement Optimal VPN tree with link capacity constraints: The same with bandwidth infinite case, except that bandwidth reserved on VPN tree links must be no more than their residual bandwidth.

  21. Symmetric bandwidths with infinite link capacity Define

  22. Symmetric bandwidths with infinite link capacity 1000 1000 X 4 1000 1000 1 1 2 2 1 1 1000 1 1 1 1 1000 Q(T,0)=2*(1000*3+1*5+1*3+1*3+1*5+1000*3)=12032 =CT. Q(T,X)=2*(1000*2+1*6+1*4+1*4+1*6+1000*4)=12080

  23. Symmetric bandwidths with infinite link capacity Find a BFS tree Tv rooted at v

  24. Asymmetric bandwidths with infinite link capacity

  25. Asymmetric bandwidths with infinite link capacity • Biased edge : e.g. (6,7) • Balanced edge : e.g. (5,6) • We refer to a node of T as a core node if a balanced edge is incident on it. Lemma 4.3 : The sum of the bandwidths reserved on a balanced edge (I,j) of a VPN tree T in both directions is CT(i,j)+CT(j,i)

  26. Asymmetric bandwidths with infinite link capacity

  27. Asymmetric bandwidths with infinite link capacity • minimize • Subject to

  28. Asymmetric bandwidths with infinite link capacity • Since we know that S must contain a node from V, we can compute the optimal tree by performing the following steps: • For each node v V, solve the integer program to compute Sv, the optimalset of nodes containing v. • Return the tree T(Sv) whose cost is minimum.

  29. Rounding Based Approximation Algorithm • LP (Relaxation of IP)

  30. Use Lin & Vitter to obtain a solution • By ellipsoid algorithm, solve the LP in polynomial time • Let 0 < c < 1 be a constant • Π • α

  31. Steps of the Rounding Algorithm

  32. Experimental Study

  33. Experimental Study

  34. Experimental Study

  35. Experimental Study

  36. Experimental Study

More Related