A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang.

Slides:



Advertisements
Similar presentations
Virtual Links: VLANs and Tunneling
Advertisements

Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Introducing VPNs.
Broad-Band Satellite Networks - The Global IT Bridge Presented by Tsoline Mikaelian Abbas Jamalipour By Abbas Jamalipour Proc. of the IEEE, Vol. 89, No.1.
Optical communications & networking - an Overview
Virtual Private Network (VPN) Its Place in a Lottery’s Communication Portfolio Leslie Vang, Deputy Director IT, SCEL.
A SLA Framework for QoS Provisioning and Dynamic Capacity Allocation Rahul Garg (IBM India Research Lab), R. S. Randhawa (Stanford University), Huzur Saran.
Module 5: Configuring Access for Remote Clients and Networks.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Provider Opportunities for Enterprise MPLS APRICOT 2006, Perth Matt.
Module 3.4: Switching Circuit Switching Packet Switching K. Salah.
FINAL EXAM TUE 5/16 MRST : open book/open notes - 25% of final grade - off campus students will receive exam by postal mail.
Introduction Future wireless systems will be characterized by their heterogeneity - availability of multiple access systems in the same physical space.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
1 EE 400 Asynchronous Transfer Mode (ATM) Abdullah AL-Harthi.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
CSCI 4550/8556 Computer Networks Comer, Chapter 15: Networking Ownership, Service Paradigm.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
A Flexible Model for Resource Management in Virtual Private Networks Sanket Naik CS590F Fall 2000.
1 Networking Basics: A Review Carey Williamson iCORE Professor Department of Computer Science University of Calgary.
Virtual Private Networks (VPN’s)
Virtual Private Network
Data Communications and Networks Chapter 2 - Network Technologies - Circuit and Packet Switching Data Communications and Network.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Algorithms for Provisioning Virtual Private Networks in the Hose Model Source: Sigcomm 2001, to appear in IEEE/ACM Transactions on Networking Author: Amit.
A Distributed Scheduling Algorithm for Real-time (D-SAR) Industrial Wireless Sensor and Actuator Networks By Kiana Karimpour.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Data Comm. & Networks Instructor: Ibrahim Tariq Lecture 3.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Chapter 2 – X.25, Frame Relay & ATM. Switched Network Stations are not connected together necessarily by a single link Stations are typically far apart.
Integrated Services Digital Network (ISDN)
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
Establishing Connections Networking Modes: When you are evaluating a network, you concentrate on circuit switching versus packet switching. But it's also.
CHAPTER #6  Introducti on to ATM. Contents  Introduction  ATM Cells  ATM Architecture  ATM Connections  Addressing and Signaling  IP over ATM.
Virtual Private Networks Warren Toomey. Available WAN Links.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Chapter 5 Multiplexing.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
Yu-Liang Liu1 On the Bandwidth Management for Hose-Model VPN Service GRADUATE INSTITUTE OF INFORMATION MANAGEMENT NATIONAL TAIWAN UNIVERSITY.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Salim Hariri HPDC Laboratory Enhanced General Switch Management Protocol Salim Hariri Department of Electrical and Computer.
Computer Networks with Internet Technology William Stallings
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Static Call Admission Control and Dimensioning of Media Gateways in IP based Mobile Core Networks Mika.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
Information Networks COMT 625 Hans Kruse. COMT Hans Kruse2 What is a network? Nodes End (User) Nodes Interior (Network) Nodes Links.
Resource Allocation in Network Virtualization Jie Wu Computer and Information Sciences Temple University.
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.
1 Switching and Forwarding Sections Connecting More Than Two Hosts Multi-access link: Ethernet, wireless –Single physical link, shared by multiple.
Chapter 8 Wide Area Networks. Announcements and Outline Announcements Outline 8.1 Introduction 8.2 Services 8.21 Circuit-Switched Networks 8.22 Dedicated-Circuit.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Data Communication Networks Lec 13 and 14. Network Core- Packet Switching.
Bearer Control for VoIP and VoMPLS Control Plane Francois Le Faucheur Bruce Thompson Cisco Systems, Inc. Angela Chiu AT&T March 30, 2000.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
COMPUTER NETWORKS CS610 Lecture-20 Hammad Khalid Khan.
OverQos: An Overlay based Architecture for Enhancing Internet Qos L Subramanian*, I Stoica*, H Balakrishnan +, R Katz* *UC Berkeley, MIT + USENIX NSDI’04,
Virtual Private Networks
Architecture and Algorithms for an IEEE 802
Understand Wide Area Networks (WANs)
Switching and High-Speed Networks
Wide Area Network.
Lecture 1: Introduction to WAN
Optical communications & networking - an Overview
Towards Predictable Datacenter Networks
Presentation transcript:

A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang

Overview Introduction of VPN Hose model Implementation scenarios Simulation experiments Simulation results conclusions

What Is a Virtual Private Network? Virtual private networks (VPN) provide an encrypted connection between a user's distributed sites over a public network (e.g., the Internet). By contrast, a private network uses dedicated circuits and possibly encryption.

Public Internet instead of Private Network A VPN replaces all of the above utilizing public internet, Performance and availability depends on your ISP and internet

Benefit - $$$$$ Traditional Private Networks:-  High fixed cost  Low variable costs (with respect to varying capacity) => collection of VPNs sharing a common communication channel are cheaper to build than the equivalent collection of smaller physically discrete networks.

Requirements for IP-based VPNs Opaque packet transport - VPN traffic no relation to rest of IP backbone traffic - VPN may use private IP address Data security - By customer ( firewall + encryption) - Secure managed VPN service by providers Quality of service - Leased and dial-up lines provide guarantee on the bandwidth and latency Tunneling mechanism - A way to implement opaque transport and security

Resource Management in VPN? Isolation from other flows Guaranteed bandwidth, loss and delay characteristics Over an existing public network Yet, same performance assurances as a private network!

QoS Support Service Level Agreement (SLA) between a customer & a service provider – traffic characteristics and QoS requirements Two ways to support different QoS classes within VPN: –resources are managed on a VPN specific basis, i.e. SLAs would be for the overall VPN rather than for each specific QoS class –resources are managed on an individual QoS basis

Hose Model Customer's interface into the network Performance guarantee based on the "aggregate" traffic To and from a given endpoint to the set of all other endpoints

Hose Model

Comparison between Pipe & Hose 2 performance service abstractions: Pipe & Hose –A pipe provides performance guarantees for traffic between A specific origin and destination pair –A hose provides performance guarantees between an origin and a set of destinations, and between a node and a set of origins, i.e. it’s characterized by the “aggregate” traffic coming from or going into the VPN.

Advantages of Hose for customer Ease of specification - one rate per endpoint vis-a-vis one rate per pair of endpoints Flexibility - traffic to multiple endpoints multiplexed on one hose Multiplexing gain - Total of hose rates < Aggregate rate in a Private network Characterization - Statistical variability over multiple pairs smoothed into hose Billing - Resize hose capacities dynamically

Implementation Scenarios

Dynamically Resized VPNs Disadvantage of provisioned VPNs Reserved capacity may not be used Resized provider pipes Resized trees Resized trees with explicit routing Resource aggregation across a VPN

Requirements for Dynamically Resized VPNs Prediction of required capacity based on traffic measurement - technique suggested Signaling protocols to dynamically reserve resources - future work

Prediction of Traffic Rate T meas - measurement window T ren - next window for which rate is renegotiated T samp - regularly spaced samples R i - average rate over inter-sample intervals Local maximum predictor R ren = max{R i } Local Gaussian predictor R ren = m +  v m = mean of R i v = variance of R i  = Multiplier

Simulation Experiments

2 sets of traces – voice and data PSTN traffic == IP telephony traffic? Experiments –The stability of VPN traffic matrices –Evaluation the usefulness of the hose model –A mesh of provider-pipes in the network vs. a source based tree –The relationship between short term capacity management by resizing and the longer term admission control algorithms

Performance Benefit of Hoses for the Customer Customer-Pipe Requirement = Hose Requirement = Statically provisioned access host-gain = Customer-Pipe Requirement / Hose Requirement

Provisioning the Access Link The capacity required by a customer on each access link depends on the service model being offered to the VPN customer If customer’s service interface into the network is Customer-Pipe: adequate capacity would need for each such pipe Hose: capacity that needed is the maximum traffic demand for the hose

Statically Provisioned Access Hose Gain for Data Traffic

Statically Provisioned Access Hose Gain for Voice Traffic

Resizing the Access Link The capability to renegotiate hose capacities is provided to customers The renegotiation is based on demand predictions derived from measurement that track the fluctuations in the offered traffic

Benefit of Resizing the Access Link for Voice Traffic

Effect of Reducing the Resizing Frequency

Benefit of Resizing the Access Link for Data Traffic

Benefit of Resizing the Access Link for Data traffic

Comparison of Benefits of Resized Hoses and Customer-Pipes

Comparison of Benefits of Resized Hoses and Customer-Pipes (cont.)

Benefits of Statically Provisioned Trees Moving from the root of a tree corresponding to a given hose towards a leaf, progressively fewer flows are aggregated together and hence we expect the benefit of sharing reservations in the tree to decrease. (Figure 11) A tree gain (the ratio of the requirement of the hose to the corresponding sum of the requirements of customer- pipe) of 1 occurs on links where each tree present on the link leads toward a single destination. (Figure 12)

Benefits of Dynamical Resizing for Voice Traffic

Benefits of Dynamical Resizing for Voice Traffic (cont.)

Benefits of Dynamical Resizing for Data Traffic

Effective Bandwidths for Admission Control

Conclusion VPNs are undergoing dramatic change owing to at least three interrelated factors: Rapid progress in IP network technologies ( in overall capacity and the development of diverse network access technologies) Progress in IP security (in flexible, dynamic methods for establishing secure associations) Rapid change in the diversity and dynamics of communication and collaboration patterns at work and at home

Conclusion (cont.) A hose is characterized by the aggregate traffic to and from one endpoint in the VPN to the set of other endpoints in the VPN and by an associated performance guarantee. A hose allows a customer to simply buy a logical access link and use it to send traffic to any one of the remote hose endpoints with reliable QoS and with the rates of the customer access links to the only limitation. Hoses naturally allow the customer to take advantage of aggregation of the flows to and from access links, reducing required access link capacities. Hoses present greater resource management challenges for the provider but it can be addressed by statistical multiplexing or resizing techniques, applied separately or in combination.

Questions?