Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/316188.316209acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free access

A flexible model for resource management in virtual private networks

Published: 30 August 1999 Publication History

Abstract

As IP technologies providing both tremendous capacity and the ability to establish dynamic secure associations between endpoints emerge, Virtual Private Networks (VPNs) are going through dramatic growth. The number of endpoints per VPN is growing and the communication pattern between endpoints is becoming increasingly hard to forecast. Consequently, users are demanding dependable, dynamic connectivity between endpoints, with the network expected to accommodate any traffic matrix, as long as the traffic to the endpoints does not overwhelm the rates of the respective ingress and egress links. We propose a new service interface, termed a hose, to provide the appropriate performance abstraction. A hose is characterized by the aggregate traffic to and from one endpoint in the VPN to the set of other endpoints in the VPN, and by an associated performance guarantee.Hoses provide important advantages to a VPN customer: (i) flexibility to send traffic to a set of endpoints without having to specify the detailed traffic matrix, and (ii) reduction in the size of access links through multiplexing gains obtained from the natural aggregation of the flows between endpoints. As compared with the conventional point to point (or customer-pipe) model for managing QoS, hoses provide reduction in the state information a customer must maintain. On the other hand, hoses would appear to increase the complexity of the already difficult problem of resource management to support QoS. To manage network resources in the face of this increased uncertainty, we consider both conventional statistical multiplexing techniques, and a new resizing technique based on online measurements.To study these performance issues, we run trace driven simulations, using traffic derived from AT&T's voice network, and from a large corporate data network. From the customer's perspective, we find that aggregation of traffic at the hose level provides significant multiplexing gains. From the provider's perspective, we find that the statistical multiplexing and resizing techniques deal effectively with uncertainties about the traffic, providing significant gains over the conventional alternative of a mesh of statically sized customer-pipes between endpoints.

References

[1]
S. Fotedar, M. Gerla, P. Crocetti, and L. Fratta, "ATM Virtual Private Networks," Communications of the A CM, vol. 38, pp. 101-109, Feb 1995.]]
[2]
B. Gleeson, A. Lin, J. Heinanen, and G. Artnitage, "A Framework for IP Based Virtual Private Networks." draft-gleeson-vpn-framework-00.txt, September 1998. Work in progress.]]
[3]
K. Muthukrislman and A. Malis, "Core IP VPN Architecture.'' draft-muthukrishnan-corevpn-arch-00, txt, October 1998. Work in progress.]]
[4]
D. Jamieson, B. Jamoussi, G. Wright, and P. Beaubien, "MPLS VPN Architecture." draft-jamieson-mpls-vpn- 00.txt, August 1998. Work in progress.]]
[5]
S. Rooney, J. E. van der Merwe, S. Crosby, and I. Leslie, "The Tempest, a Framework for Safe, Resource Assured, Programmable Networks," IEEE Communications Magazine, vol. 36, pp. 42-53, October 1998.]]
[6]
S. Kent and R. Atkinson, "Security Architecture for the Internet Protocol." RFC 2401, November 1998.]]
[7]
M. Grossglauser and D. N. Tse, "A Framework for Robust Measurement-Based Admission Control," in Proceedings A CM SIGCOMM 97, (Cannes, France), 1997.]]
[8]
W. E. Leland, M. S. Taqqu, W. Willinger, and D. V. Wilson, "On the Self-Similar Nature of Ethernet Traffic (Extended Version)," IEEE/A CM Transactions on Networking, vol. 2, no. 1, pp. 1-15, 1994.]]
[9]
V. Paxson and S. Floyd, "Wide-Area Traffic: The Failure of Poisson Modeling," IEEE/A CM Transactions on Networking, vol. 3, no. 1, pp. 226-244, 1995.]]
[10]
A. Feldmann, A. C. Gilbert, W. Willinger, and T. Kurtz, "Looking Behind And Beyond Self-similarity: On Scaling Phenomena in Measured WAN Traffic," in Proceedings of the 35th Allterton Conference on Communication, Control and Computing, 1997.]]
[11]
Cisco NetFlow. For more information see ht tp://www, c isco. c om/warp/publ ic/732/net f low/.]]
[12]
E. Knightly and N. Shroff, "Admission Control for Sta. tistical QoS: Theory and Practice," IEEE Network, vol. 13, no. 2, pp. 20-29, 1999.]]

Cited By

View all
  • (2024)gPerfIsol: GNN-Based Rate-Limits Allocation for Performance Isolation in Multi-Tenant Cloud2024 27th Conference on Innovation in Clouds, Internet and Networks (ICIN)10.1109/ICIN60470.2024.10494419(194-201)Online publication date: 11-Mar-2024
  • (2024)Traffic Divergence Theory: An Analysis Formalism for Dynamic NetworksIEEE Access10.1109/ACCESS.2024.338343612(67512-67524)Online publication date: 2024
  • (2024)Maximum elastic scheduling of virtual machines in general graph cloud data center networksCyber-Physical Systems10.1080/23335777.2023.230110610:3(283-301)Online publication date: 4-Jan-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGCOMM '99: Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
August 1999
320 pages
ISBN:1581131356
DOI:10.1145/316188
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 August 1999

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

SIGCOMM99
Sponsor:

Acceptance Rates

SIGCOMM '99 Paper Acceptance Rate 24 of 190 submissions, 13%;
Overall Acceptance Rate 462 of 3,389 submissions, 14%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)215
  • Downloads (Last 6 weeks)32
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)gPerfIsol: GNN-Based Rate-Limits Allocation for Performance Isolation in Multi-Tenant Cloud2024 27th Conference on Innovation in Clouds, Internet and Networks (ICIN)10.1109/ICIN60470.2024.10494419(194-201)Online publication date: 11-Mar-2024
  • (2024)Traffic Divergence Theory: An Analysis Formalism for Dynamic NetworksIEEE Access10.1109/ACCESS.2024.338343612(67512-67524)Online publication date: 2024
  • (2024)Maximum elastic scheduling of virtual machines in general graph cloud data center networksCyber-Physical Systems10.1080/23335777.2023.230110610:3(283-301)Online publication date: 4-Jan-2024
  • (2023)Short Paper - A Note on Robust Combinatorial Optimization with Generalized Interval UncertaintyOpen Journal of Mathematical Optimization10.5802/ojmo.234(1-7)Online publication date: 5-Jun-2023
  • (2023)Augmented Queue: A Scalable In-Network Abstraction for Data Center Network SharingProceedings of the ACM SIGCOMM 2023 Conference10.1145/3603269.3604858(305-318)Online publication date: 10-Sep-2023
  • (2023)Hose-based cross-layer backbone network design with Benders decompositionProceedings of the ACM SIGCOMM 2023 Conference10.1145/3603269.3604854(333-345)Online publication date: 10-Sep-2023
  • (2023)Load-optimization in Reconfigurable Data-center Networks: Algorithms and Complexity of Flow RoutingACM Transactions on Modeling and Performance Evaluation of Computing Systems10.1145/35972008:3(1-30)Online publication date: 18-Jul-2023
  • (2023)Towards a Manageable Intra-Host NetworkProceedings of the 19th Workshop on Hot Topics in Operating Systems10.1145/3593856.3595890(206-213)Online publication date: 22-Jun-2023
  • (2022)Designing Nonblocking Networks With a General TopologyIEEE Access10.1109/ACCESS.2021.313973210(8399-8408)Online publication date: 2022
  • (2022)On the robustness of potential-based flow networksMathematical Programming10.1007/s10107-021-01760-w197:1(337-374)Online publication date: 9-Feb-2022
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media