Restoration algorithms for virtual private networks in the hose model

被引:0
|
作者
Italiano, GF [1 ]
Rastogi, R [1 ]
Yener, B [1 ]
机构
[1] Univ Roma Tor Vergata, Dipartimento Informat Sist & Prod, Rome, Italy
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Virtual Private Network (VPN) alms to emulate the services provided by a private network over the shared Internet. The endpoints of a VPN tire connected using abstractions such as Virtual Channels (VCs) of ATM or Label Switching Paths (LSPs) of MPLS technologies. Reliability of an end-to-end VPN connection depends on the reliability of the links and nodes in the fixed path that it traverses in the network. In order to ensure service quality and availability in a VPN, seamless recovery from failures is essential. This work considers the problem of fast recovery in the recently proposed VPN hose model. In the hose model bandwidth is reserved for traffic aggregates instead of pairwise specifications to allow any traffic pattern among the VPN endpoints. This work assumes that the VPN endpoints are connected using a Owe structure and at any time, at most one tree link can fail (i.e., single link failure model). A restoration algorithm must select a set of backup edges and allocate necessary bandwidth on them in advance, so that the traffic disrupted by failure of a primary edge can be re-routed via backup paths. We aim at designing an optimal restoration algorithm to minimize the total bandwidth reserved on the backup edges. This problem is a variant of optimal graph augmentation problem which is NP-Complete. Thus, we present a polynomial-time approximation algorithm that guarantees a solution which is at most 16 times of the optimum. The algorithm is based on designing two reductions to convert the original problem to one of adding minimum cost edges to the VPN tree so that the resulting graph is 2-connected, which can be solved in polynomial time using known algorithms. The two reductions introduce approximation factors of 8 and 2, respectively, thus resulting in a 16-approximation algorithm with polynomial time complexity.
引用
收藏
页码:131 / 139
页数:9
相关论文
共 50 条
  • [41] Virtual private networks - how they work
    Younglove, R
    COMPUTING & CONTROL ENGINEERING JOURNAL, 2000, 11 (06): : 260 - 262
  • [42] Integrity for virtual private routed networks
    Bush, R
    Griffin, TG
    IEEE INFOCOM 2003: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2003, : 1467 - 1476
  • [43] Future of virtual private networks (VPN)
    Bajenesco, T.I.
    Technische Mitteilungen (Schweizerische Post-, Telephon- und Telegraphenbetriebe), 73 (07):
  • [44] New economical virtual private networks
    Ben-Ameur, W
    Kerivin, H
    COMMUNICATIONS OF THE ACM, 2003, 46 (06) : 69 - 73
  • [45] Virtual private networks simplify communications
    Bellm, M
    CONTROL ENGINEERING, 1998, 45 (06) : 50 - 50
  • [46] Resource management for virtual private networks
    Raghunath, Satish
    Ramakrishnan, K. K.
    IEEE COMMUNICATIONS MAGAZINE, 2007, 45 (04) : 38 - 44
  • [47] Mobile IP and virtual private networks
    Bhagavathula, R
    Thanthry, N
    Pendse, R
    IEEE 56TH VEHICULAR TECHNOLOGY CONFERENCE, VTC FALL 2002, VOLS 1-4, PROCEEDINGS, 2002, : 2414 - 2418
  • [48] Virtual private networks: Leveraging the Internet
    Ortiz, S
    COMPUTER, 1997, 30 (11) : 18 - 20
  • [49] Management of optical Virtual Private Networks
    Wu, Jing
    Savoie, Michel
    Campbell, Scott
    Zhang, Hanxi
    NETWORK ARCHITECTURES, MANAGEMENT, AND APPLICATIONS V, PTS 1 AND 2, 2007, 6784
  • [50] Distributed weakness in virtual private networks
    Patton, S
    Doss, D
    Yurcik, W
    25TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS - PROCEEDINGS, 2000, : 96 - 97