Algorithms for Provisioning Virtual Private Networks in the Hose Model Source: Sigcomm 2001, to appear in IEEE/ACM Transactions on Networking Author: Amit.

Slides:



Advertisements
Similar presentations
QoS Routing for MPLS Networks Employing Mobile Agents By: Sergio Gonzalez-Valenzuela and Victor C. M. Leung Presented by: Nathan Balon.
Advertisements

Outline LP formulation of minimal cost flow problem
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
Page 1 / 14 The Mesh Comparison PLANET’s Layer 3 MAP products v.s. 3 rd ’s Layer 2 Mesh.
Data and Computer Communications Ninth Edition by William Stallings Chapter 12 – Routing in Switched Data Networks Data and Computer Communications, Ninth.
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
1 Efficient and Robust Streaming Provisioning in VPNs Z. Morley Mao David Johnson Oliver Spatscheck Kobus van der Merwe Jia Wang.
Management Science 461 Lecture 2b – Shortest Paths September 16, 2008.
A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang.
Network Correlated Data Gathering With Explicit Communication: NP- Completeness and Algorithms R˘azvan Cristescu, Member, IEEE, Baltasar Beferull-Lozano,
1 Maximizing Lifetime of Sensor Surveillance Systems IEEE/ACM TRANSACTIONS ON NETWORKING Authors: Hai Liu, Xiaohua Jia, Peng-Jun Wan, Chih- Wei Yi, S.
AHOP Problem and QoS Route Pre-computation Adam Sachitano IAL.
Traffic Engineering With Traditional IP Routing Protocols
A Constant Factor Approximation Algorithm for the Multicommodity Rent-or-Buy Problem Amit Kumar Anupam Gupta Tim Roughgarden Bell Labs CMU Cornell joint.
Traffic Engineering Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
1 Internet Networking Spring 2006 Tutorial 6 Network Cost of Minimum Spanning Tree.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
[1][1][1][1] Lecture 2-3: Coping with NP-Hardness of Optimization Problems in Practice May 26 + June 1, Introduction to Algorithmic Wireless.
Traffic Engineering and Routing Hansen Bow. Topics Traffic Engineering with MPLS Issues Concerning Voice over IP Features of Netscope QoS Routing for.
CS541 Advanced Networking 1 Routing and Shortest Path Algorithms Neil Tang 2/18/2009.
1 Internet Networking Spring 2004 Tutorial 6 Network Cost of Minimum Spanning Tree.
Hardness of Approximation and Greedy Algorithms for the Adaptation Problem in Virtual Environments Ananth I. Sundararaj, Manan Sanghi, John R. Lange and.
Building Edge-Failure Resilient Networks Chandra Chekuri Bell Labs Anupam Gupta Bell Labs ! CMU Amit Kumar Cornell ! Bell Labs Seffi Naor, Danny Raz Technion.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
CSE 550 Computer Network Design Dr. Mohammed H. Sqalli COE, KFUPM Spring 2007 (Term 062)
A Flexible Model for Resource Management in Virtual Private Networks Sanket Naik CS590F Fall 2000.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
SMUCSE 8344 Constraint-Based Routing in MPLS. SMUCSE 8344 Constraint Based Routing (CBR) What is CBR –Each link a collection of attributes (performance,
C&O 355 Mathematical Programming Fall 2010 Lecture 17 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A.
1.3 Modeling with exponentially many constr.  Some strong formulations (or even formulation itself) may involve exponentially many constraints (cutting.
Topology Design for Service Overlay Networks with Bandwidth Guarantees Sibelius Vieira* Jorg Liebeherr** *Department of Computer Science Catholic University.
Lecture 15. IGP and MPLS D. Moltchanov, TUT, Spring 2008 D. Moltchanov, TUT, Spring 2015.
Integrated Dynamic IP and Wavelength Routing in IP over WDM Networks Murali Kodialam and T. V. Lakshman Bell Laboratories Lucent Technologies IEEE INFOCOM.
Guy Even & Moti Medina EE Tel-Aviv University Gregor Schaffrath & Stefan Schmid Deutsche Telekom Labs, TU Berlin.
Network Aware Resource Allocation in Distributed Clouds.
Approximating Minimum Bounded Degree Spanning Tree (MBDST) Mohit Singh and Lap Chi Lau “Approximating Minimum Bounded DegreeApproximating Minimum Bounded.
Topology aggregation and Multi-constraint QoS routing Presented by Almas Ansari.
1 Multiconstrained QoS Routing: Simple Approximations to Hard Problems Guoliang (Larry) Xue Arizona State University Research Supported by ARO and NSF.
Modeling and Evaluation with Graph Mohammad Khalily Dermany Islamic Azad University, Khomein branch.
Low-Power Gated Bus Synthesis for 3D IC via Rectilinear Shortest-Path Steiner Graph Chung-Kuan Cheng, Peng Du, Andrew B. Kahng, and Shih-Hung Weng UC San.
De-Nian Young Ming-Syan Chen IEEE Transactions on Mobile Computing Slide content thanks in part to Yu-Hsun Chen, University of Taiwan.
Yu-Liang Liu1 On the Bandwidth Management for Hose-Model VPN Service GRADUATE INSTITUTE OF INFORMATION MANAGEMENT NATIONAL TAIWAN UNIVERSITY.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Network-Coding Multicast Networks With QoS Guarantees Yuanzhe Xuan and Chin-Tau Lea, Senior Member, IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19,
Minimax Open Shortest Path First (OSPF) Routing Algorithms in Networks Supporting the SMDS Service Frank Yeong-Sung Lin ( 林永松 ) Information Management.
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints Yao Zhao, Zhaosheng Zhu, Yan Chen, Northwestern University Dan.
QoS Routing ISDL Quality of Service Routing Algorithms for Bandwidth-Delay Constrained Applications Yi Yang, Jogesh Muppala et al.
NTU IM Page 1 of 35 Modelling Data-Centric Routing in Wireless Sensor Networks IEEE INFOCOM Author: Bhaskar Krishnamachari Deborah Estrin Stephen.
Analysis and algorithms of the construction of the minimum cost content-based publish/subscribe overlay Yaxiong Zhao and Jie Wu
CS223 Advanced Data Structures and Algorithms 1 Maximum Flow Neil Tang 3/30/2010.
Resource Allocation in Network Virtualization Jie Wu Computer and Information Sciences Temple University.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Minimizing Energy Expense for Chain-Based Data Gathering in Wireless Sensor Networks Li-Hsing Yen Chung Hua University Taiwan EWSN 05.
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
Tunable QoS-Aware Network Survivability Presenter : Yen Fen Kao Advisor : Yeong Sung Lin 2013 Proceedings IEEE INFOCOM.
C&O 355 Lecture 19 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A A A A A A A.
Introduction to Multiple-multicast Routing Chu-Fu Wang.
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
::Network Optimization:: Minimum Spanning Trees and Clustering Taufik Djatna, Dr.Eng. 1.
Impact of Interference on Multi-hop Wireless Network Performance
Frank Yeong-Sung Lin (林永松) Information Management Department
CS223 Advanced Data Structures and Algorithms
1.3 Modeling with exponentially many constr.
Quality of Service in Multimedia Distribution
1.3 Modeling with exponentially many constr.
EE5900 Advanced Embedded System For Smart Infrastructure
Frank Yeong-Sung Lin (林永松) Information Management Department
Presentation transcript:

Algorithms for Provisioning Virtual Private Networks in the Hose Model Source: Sigcomm 2001, to appear in IEEE/ACM Transactions on Networking Author: Amit Kumar, Rajeev Rastogi, Avi Siberschatz and Bulent Yener

Outline Introduction Provisioning algorithms Determination of link bandwidth Problem Statement Symmetric bandwidth case Asymmetric bandwidth case Experimental study

Introduction A VPN establishes connectivity between a set of endpoints over a shared network infrastructure. Issues of offering customers with guaranteed bandwidth VPN service has received little attention. This paper addresses the problem of provisioning VPN services with bandwidth guarantees.

Introduction Two popular models for providing QoS in VPNs :  Pipe model  Hose model

Introduction In the pipe model, customer specifies QoS requirements between every pair of endpoints. This requires the customer to know the complete traffic matrix. However, the number of endpoints per VPN is constantly increasing and the communication patterns between endpoints are becoming increasingly complex. Predicting traffic characteristics between pairs of endpoint is a difficult task for customers.

Introduction In the hose model, the customer specifies QoS requirements per endpoint and not every pair of endpoints. Each endpoint is associated with an ingress bandwidth and an egress bandwidth. Ingress bandwidth: the amount of incoming traffic from all the other endpoints into the endpoint. Egress bandwidth: the amount of traffic the endpoint can send to the other endpoints.

Introduction The customer only needs to specify QoS requirement on a per endpoint basis. As a result, the hose model place less burden on VPN customers.

Introduction The hose model provides customers with the the following advantages over the pipe model: Ease of Spec Flexibility Multiplexing Gain Characterization In order to to realize these benefits, efficient algorithms must be devised for provisioning hoses.

Provisioning algorithms Hose provisioning algorithms need to set up paths between every pair of VPN endpoints such that the aggregate bandwidth reserved is minimum. The provisioning algorithms also need to reserve sufficient bandwidth to accommodate the traffic that meets ingress and egress bandwidth constraints.

Provisioning algorithms Network Graph

Provisioning algorithms Independent Shortest pathsLink Sharing Among Paths Reserved bandwidth=6Reserved bandwidth=8

Provisioning algorithms In order to take advantage of the multiplexing gain due to hoses, this paper connects endpoints using a tree structure. A VPN tree has several benefits: Sharing of bandwidth reservation Scalability Simplicity of Routing Ease of Restoration

Provisioning algorithms This paper develops algorithms for computing optimal VPN trees under four scenarios: Network links capacity Endpoints Bandwidth requirement infinitelimited Symmetric ingress and egress bandwidths O(mn) Both the problem and it’s approximation algorithms are NP-hard. Asymmetric ingress and egress bandwidths NP-hard Both the problem and it’s approximation algorithms are NP-hard.

Determination of link bandwidth Network graph

Determination of link bandwidth A VPN tree

Problem Statement Optimal VPN tree without link capacity constraints: Given a set of VPN endpoints, and their ingress and egress bandwidths, compute a VPN tree whose leaves are endpoints and for which aggregated bandwidth reserved is minimum. [3] has suggested that Steiner tree can be used to connect the VPN endpoints, however, it may be suboptimal.

Problem Statement Network graph

Problem Statement Reserved bandwidth=10008 Steiner tree

Problem Statement Optimal VPN tree Reserved bandwidth=4012

Problem Statement Optimal VPN tree with link capacity constraints: The same with bandwidth infinite case, except that bandwidth reserved on VPN tree links must be no more than their residual bandwidth.

Symmetric bandwidths with infinite link capacity Define

Symmetric bandwidths with infinite link capacity Q(T,0)=2*(1000*3+1*5+1*3+1*3+1*5+1000*3)=12032 =C T. Q(T,X)=2*(1000*2+1*6+1*4+1*4+1*6+1000*4)=12080 X

Symmetric bandwidths with infinite link capacity Find a BFS tree T v rooted at v

Asymmetric bandwidths with infinite link capacity

Biased edge : e.g. (6,7) Balanced edge : e.g. (5,6) We refer to a node of T as a core node if a balanced edge is incident on it. Lemma 4.3 : The sum of the bandwidths reserved on a balanced edge (I,j) of a VPN tree T in both directions is C T (i,j)+C T (j,i)

Asymmetric bandwidths with infinite link capacity

minimize Subject to

Asymmetric bandwidths with infinite link capacity Since we know that S must contain a node from V, we can compute the optimal tree by performing the following steps: –For each node v  V, solve the integer program to compute Sv, the optimalset of nodes containing v. –Return the tree T(Sv) whose cost is minimum.

Rounding Based Approximation Algorithm LP (Relaxation of IP)

Use Lin & Vitter to obtain a solution By ellipsoid algorithm, solve the LP in polynomial time Let 0 < c < 1 be a constant Π α

Steps of the Rounding Algorithm

Experimental Study