On the cost of virtual private networks

被引:11
|
作者
Cohen, R [1 ]
Kaempfer, G [1 ]
机构
[1] Technion Israel Inst Technol, Dept Comp Sci, IL-32000 Haifa, Israel
关键词
Algorithms - Computational complexity - Graph theory - Heuristic methods - Intranets - Network protocols - Routers - Telecommunication links - Telecommunication traffic;
D O I
10.1109/90.893873
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A virtual private network (VPN) is a private data network that uses a nonprivate data network to carry traffic between remote sites, An "Intranet VPN" establishes network layer connectivity between remote Intranet sites by creating an TP overlay network over the nonprivate network, using various tunneling mechanisms, There are two approaches for establishing such tunnels: a "CPE-based approach" and a "network-based approach." In the first approach, tunnels are established only between the CPE devices, whereas in the second approach tunnels are also established between the routers of the core nonprivate network. In this paper we address the problem of determining a CPE-based and a network-based layout of VPN tunnels while taking into account two factors: the cost of the links over which the VPN tunnels are established and the cost of the core routers that serve as end points for the VPN. We define related graph algorithm problems, analyze their complexity, and present heuristics for solving these problems efficiently.
引用
收藏
页码:775 / 784
页数:10
相关论文
共 50 条
  • [1] Minimal cost design of Virtual Private Networks
    Liang, H
    Kabranov, O
    Makrakis, D
    Orozco-Barbosa, L
    IEEE CCEC 2002: CANADIAN CONFERENCE ON ELECTRCIAL AND COMPUTER ENGINEERING, VOLS 1-3, CONFERENCE PROCEEDINGS, 2002, : 1610 - 1615
  • [2] Virtual private networks
    Sharma, Vishal
    Ghani, Nasir
    Fang, Luyuan
    IEEE COMMUNICATIONS MAGAZINE, 2007, 45 (04) : 24 - 25
  • [3] Dynamic virtual private networks
    McGee, AR
    Vasireddy, SR
    Johnson, KJ
    Chandrashekhar, U
    Richman, SH
    El-Sayed, M
    BELL LABS TECHNICAL JOURNAL, 2002, 6 (02) : 116 - 135
  • [4] Dynamic virtual private networks
    Kirstein, P
    Whelan, E
    Carlberg, K
    O'Hanlon, P
    ADVANCED SECURITY TECHNOLOGIES IN NETWORKING, 2001, 178 : 109 - 120
  • [5] IP virtual private networks
    Hills, S
    McGlaughlin, D
    Hanafi, N
    BT TECHNOLOGY JOURNAL, 2000, 18 (03) : 151 - 161
  • [6] ATM VIRTUAL PRIVATE NETWORKS
    FOTEDAR, S
    GERLA, M
    CROCETTI, P
    FRATTA, L
    COMMUNICATIONS OF THE ACM, 1995, 38 (02) : 101 - 109
  • [7] Standards for virtual private networks
    Maeda, Y
    IEEE COMMUNICATIONS MAGAZINE, 2004, 42 (06) : 114 - 115
  • [8] SSL virtual private networks
    Harding, A
    COMPUTERS & SECURITY, 2003, 22 (05) : 416 - 420
  • [9] Integrity for virtual private routed networks
    Bush, R
    Griffin, TG
    IEEE INFOCOM 2003: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2003, : 1467 - 1476
  • [10] Virtual private networks - how they work
    Younglove, R
    COMPUTING & CONTROL ENGINEERING JOURNAL, 2000, 11 (06): : 260 - 262