Restoration algorithms for virtual private networks in the hose model

被引:0
|
作者
Italiano, GF [1 ]
Rastogi, R [1 ]
Yener, B [1 ]
机构
[1] Univ Roma Tor Vergata, Dipartimento Informat Sist & Prod, Rome, Italy
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Virtual Private Network (VPN) alms to emulate the services provided by a private network over the shared Internet. The endpoints of a VPN tire connected using abstractions such as Virtual Channels (VCs) of ATM or Label Switching Paths (LSPs) of MPLS technologies. Reliability of an end-to-end VPN connection depends on the reliability of the links and nodes in the fixed path that it traverses in the network. In order to ensure service quality and availability in a VPN, seamless recovery from failures is essential. This work considers the problem of fast recovery in the recently proposed VPN hose model. In the hose model bandwidth is reserved for traffic aggregates instead of pairwise specifications to allow any traffic pattern among the VPN endpoints. This work assumes that the VPN endpoints are connected using a Owe structure and at any time, at most one tree link can fail (i.e., single link failure model). A restoration algorithm must select a set of backup edges and allocate necessary bandwidth on them in advance, so that the traffic disrupted by failure of a primary edge can be re-routed via backup paths. We aim at designing an optimal restoration algorithm to minimize the total bandwidth reserved on the backup edges. This problem is a variant of optimal graph augmentation problem which is NP-Complete. Thus, we present a polynomial-time approximation algorithm that guarantees a solution which is at most 16 times of the optimum. The algorithm is based on designing two reductions to convert the original problem to one of adding minimum cost edges to the VPN tree so that the resulting graph is 2-connected, which can be solved in polynomial time using known algorithms. The two reductions introduce approximation factors of 8 and 2, respectively, thus resulting in a 16-approximation algorithm with polynomial time complexity.
引用
收藏
页码:131 / 139
页数:9
相关论文
共 50 条
  • [21] Classification of Virtual Private networks encrypted traffic using ensemble learning algorithms
    Almomani, Ammar
    EGYPTIAN INFORMATICS JOURNAL, 2022, 23 (04) : 57 - 68
  • [22] Hierarchical virtual partitioning: Algorithms for virtual private networking
    Mitra, D
    Ziedins, I
    GLOBECOM 97 - IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, CONFERENCE RECORD, VOLS 1-3, 1997, : 1784 - 1791
  • [23] Hierarchical virtual partitioning - Algorithms for virtual private networking
    Mitra, D
    Ziedins, I
    BELL LABS TECHNICAL JOURNAL, 1997, 2 (02) : 68 - 81
  • [24] A Fair Model for Autonomic Bandwidth Management in Virtual Private Networks
    Bellah, S. Moemen
    Khanjari, H.
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORKS AND SATELLITE (COMNESTAT), 2015, : 37 - 42
  • [25] Dynamic virtual private networks
    McGee, AR
    Vasireddy, SR
    Johnson, KJ
    Chandrashekhar, U
    Richman, SH
    El-Sayed, M
    BELL LABS TECHNICAL JOURNAL, 2002, 6 (02) : 116 - 135
  • [26] Dynamic virtual private networks
    Kirstein, P
    Whelan, E
    Carlberg, K
    O'Hanlon, P
    ADVANCED SECURITY TECHNOLOGIES IN NETWORKING, 2001, 178 : 109 - 120
  • [27] IP virtual private networks
    Hills, S
    McGlaughlin, D
    Hanafi, N
    BT TECHNOLOGY JOURNAL, 2000, 18 (03) : 151 - 161
  • [28] ATM VIRTUAL PRIVATE NETWORKS
    FOTEDAR, S
    GERLA, M
    CROCETTI, P
    FRATTA, L
    COMMUNICATIONS OF THE ACM, 1995, 38 (02) : 101 - 109
  • [29] Standards for virtual private networks
    Maeda, Y
    IEEE COMMUNICATIONS MAGAZINE, 2004, 42 (06) : 114 - 115
  • [30] SSL virtual private networks
    Harding, A
    COMPUTERS & SECURITY, 2003, 22 (05) : 416 - 420