Back
 IJCNS  Vol.11 No.4 , April 2018
Analysis of Dynamic Virtual Private Networks Resource Allocation Schemes
Abstract: The need for high performance resource allocation schemes for Virtual Private Networks (VPNs) has led to the proliferation of algorithms for VPN resource allocation. It was found that most works on VPN resource allocation focused either on admission control or link reservation on the network. Also, review of relevant literatures has revealed the need for a resource allocation/scheduling scheme whose algorithm will be able to allocate bandwidth and memory resources to different VPNS sharing the same link to the network service provider. Resources should be allocated in such a manner that utilization is optimal while VPN endpoints or customers receive services that do not undermine the service-level agreement (SLA) with the service provider. MATLAB Simulink was used to design a simulation model for analysing the VPN access network obtaining and comparing results for the link bandwidth utilization, buffer memory utilization and packet loss rate performances of the RDVNP (Robust Dynamic Virtual Network Provisioning) algorithm against the DWARF-Net (Dynamic bandwidth Allocation and guarantee on Resource Fairness) algorithm. From the results obtained, DWARF-Net algorithm’s performance was better than the RDVNP’s algorithm in almost all parameters tested on. On bandwidth utilization, DWARF-Net had an average channel utilization of 61.23% against RDVNP’s 48.28%, on buffer utilization 42% for DWARF-Net, 41% for RDVNP and average loss rate average of 1 Packet/second for DWARF-Net against 20 Packets/second for RDVNP. From the simulation analysis and result of this work, DWARF-Net is recommended as an optimal performing algorithm for VPN resource allocation.
Keywords: ATM, DWARF-Net, MPLS, RDVNP, VPN
Cite this paper: Augustine, C. , Anthony, C. , Maryrose, C. , Chukwudi, N. and Cosmas, I. (2018) Analysis of Dynamic Virtual Private Networks Resource Allocation Schemes. International Journal of Communications, Network and System Sciences, 11, 53-67. doi: 10.4236/ijcns.2018.114005.
References

[1]   Augustine, A., Chukwudi, I. and Cosmas, A. (2015) Performance Evaluation of Enterprise-Wide Network that It’s Backbone Is Based on Leased Trunk. International Journal of Communications, Network and System Sciences, 8, 399-407.
https://doi.org/10.4236/ijcns.2015.810037

[2]   Scott, C., Wolfe, P., Erwin, M. and Tunnel, A. (1998) Virtual Private Networks. 2nd Edition, O’Reilly, Sebastopol.

[3]   Augustine, A., Chukwudi, I. and Cosmas, A. (2015) Dynamic Resource Allocation Scheme for an ATM Based Enterprise-Wide Network. International Journal of Scientific & Engineering Research, 6, No. 11.
http://www.ijser.org

[4]   Ahmed, M. and Basit, A. (2014) Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone. International Journal of Computer Science and Telecommunication, 5, No. 6.

[5]   Zou, Y., Mi, Z. and Meng, X. (2006) A Genetic Algorithm for Optimization of Bandwidth Assignment in Hose-Modeled VPN. Lecture Notes on Computer Science, No. 60472105, 315-323.
https://doi.org/10.1007/978-3-540-37275-2_41

[6]   Osuagwu, D.H.O., Ajibo, A.C., Ugwuanyi, S.O., Nwachi-Ikpo, J. and Ani, C.I. (2017) Dynamic Bandwidth Scheduling for WCDMA Uplink Transmission. International Journal of Scientific & Engineering Research, 8, No. 2.

[7]   Ali, S. and Rana, B.Z. (2011) OPNET Analysis of VoIP over MPLS VPN with IP QoS. Master’s Thesis, Blekinge Institute of Technology, Blekinge.

[8]   Stallings, W. (2001) MPLS—The Internet Protocol Journal—Volume 4, Number 3.
http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_4-3/mpls.html

[9]   Davie, B.S. and Farrel, A. (2008) MPLS: Next Steps. 2nd Edition, Morgan Kaufmann Publishers, Burlington.

[10]   Forouzan, B.A. (2007) Data Communication and Networking. 4th Edition, McGraw-Hill, New York.

[11]   Xiao, X., Hannan, A., Bailey, B. and Ni, L.M. (2002) Traffic Engineering with MPLS in the Internet. IEEE Network, 14, 1-14.

[12]   Ben-Ameur, W. and KERIVIN, H. (2005) Routing of Uncertain Traffic Demands. Springer Science, No. 6, 283-313.

[13]   Ma, Z. (2007) Multipath Resource Management in Overlay Networks Multipath Resource Management in Overlay Networks. Dissertation Director, Arvind Krishnamurthy.

[14]   Carugi, M. and McDysan, D. (2005) Service Requirements for Layer 3 Provider Provisioned Virtual Private Networks (PPVPNs). RFC 4031 Network Working Group.

[15]   Liu, Y.L. and Chin, Y.T. (2010) Traffic Engineering for Provisioning VPNs with Time-Varying Bandwidth Requirements. 2010 International Conference on Electronics and Information Engineering (ICEIE), 2, 309-313.
https://doi.org/10.1109/ICEIE.2010.5559788

[16]   Mariz, D., Kelner, J., Sadok, D. and Kamienski, C.A. (2005) The Accurate Hose Model for VPN Provisioning. XXIII Simpósio Brasileiro de Redes de Computadores.

[17]   Liu, Y., Sun, Y.S. and Chen, M.C. (2006) MTRA: An On-Line Hose-Model VPN Provisioning Algorithm. Telecommunication Systems, 31, 379-398.

[18]   Wei, D. and Ansari, N. (2004) Implementing Fair Bandwidth Allocation Schemes in Hose-Modelled VPN. IEE Proceedings-Communications, 151, 521-528. ttps://doi.org/10.1049/ip-com:20040840

[19]   Alpar, J., Istvan, S. and Aron, S. (2003) On Bandwidth Efficiency of the Hose Resource Management Model in Virtual Private Networks. 22nd Annual Joint Conference of the IEEE Computer and Communications, 1, 386-395.

[20]   Rikli, N. (2011) Evaluation of End-to-End Quality of Service over VPN Networks through Various Priority Mechanisms. The 6th International Conference on Digital Telecommunications, Beirut, 145-149.

[21]   Chu, J. and Lea, C. (2007) A Restorable MPLS-Based Hose-Model VPN Network. Computer Networks, 51, 4836-4848.

[22]   Dong, W. and Nirwan, A. (2004) Implementing Fair Bandwidth Allocation Schemes in Hose-Modelled VPN. IEE Proceedings-Communications, 151, 521-528.

[23]   Byun, H. and Lee, M. (2007) Extensions to P2MP RSVP-TE for VPN-Specific State Provisioning with Fair Resource Sharing. Computer Communications, 30, 3736-3745.
https://doi.org/10.1016/j.comcom.2007.09.007

[24]   Christian, M., Dotaro, E. and Papadimitriou, D. (2006) A Practical Approach to VPN Resource Management using a Dynamic Hose Model. 2006 2nd Conference on Next Generation Internet Design and Engineering, Valencia, 3-5 April 2006, 147-153.

[25]   Lim, L.K., Gao, J., Ng, T.S.E., Chandra, P.R., Steenkiste, P. and Zhang, H. (2001) Customizable Virtual Private Network Service with QoS. Computer Networks, 36, 137-151.

[26]   Alt1n, A., Amaldi, E., Belotti, P. and P1nar, M.C. (2004) Virtual Private Network Design under Traffic Uncertainty. Electronic Notes in Discrete Mathematics, 17, 19-22.

[27]   Bai, H., Gu, F., Crichignoi, J., Khan, S. and Ghani, N. (2014) Virtual Network Scheduling Design. 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), Luxembourg, 8-10 October 2014, 362-367.
https://doi.org/10.1109/CloudNet.2014.6969022

[28]   Min, Z., Chunming, W.U., Yue, H., Qiang, Y., Bin, W. and Ming, J. (2013) Robust Dynamical Virtual Network Provisioning. Chinese Journal of Electronics, 22, 151-154.

[29]   Wang, J. (2014) Dynamic Bandwidth Allocation & Guarantee for Virtualized Networks in Cloud. 2013 9th International Conference on Information, Communications and Signal Processing (ICICS), Tainan, 10-13 December 2013, 1-5.

[30]   Tan, L., Yang, P., Zhang, W. and Ge, F. (2012) On Utility-Optimised Router-Level Bandwidth Allocation. Transactions on Emerging Telecommunications Technologies, 24, 303-316.

 
 
Top