On the cost of virtual private networks

被引:11
|
作者
Cohen, R [1 ]
Kaempfer, G [1 ]
机构
[1] Technion Israel Inst Technol, Dept Comp Sci, IL-32000 Haifa, Israel
关键词
Algorithms - Computational complexity - Graph theory - Heuristic methods - Intranets - Network protocols - Routers - Telecommunication links - Telecommunication traffic;
D O I
10.1109/90.893873
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A virtual private network (VPN) is a private data network that uses a nonprivate data network to carry traffic between remote sites, An "Intranet VPN" establishes network layer connectivity between remote Intranet sites by creating an TP overlay network over the nonprivate network, using various tunneling mechanisms, There are two approaches for establishing such tunnels: a "CPE-based approach" and a "network-based approach." In the first approach, tunnels are established only between the CPE devices, whereas in the second approach tunnels are also established between the routers of the core nonprivate network. In this paper we address the problem of determining a CPE-based and a network-based layout of VPN tunnels while taking into account two factors: the cost of the links over which the VPN tunnels are established and the cost of the core routers that serve as end points for the VPN. We define related graph algorithm problems, analyze their complexity, and present heuristics for solving these problems efficiently.
引用
收藏
页码:775 / 784
页数:10
相关论文
共 50 条
  • [31] Diagnosing configuration errors in virtual private networks
    Narain, S
    Rangadurai, M
    Shareef, A
    2001 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-10, CONFERENCE RECORD, 2001, : 189 - 193
  • [32] Securing Virtual Private Networks with SIM Authentication
    Bjornstad, Torstein
    Jorstad, Ivar
    Do Van Thanh
    THIRD IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS - WIMOB 2007, 2007,
  • [33] ISDN AS THE BACKBONE FOR CENTREX AND VIRTUAL PRIVATE NETWORKS
    ELDIN, J
    LATHIA, KP
    ELECTRICAL COMMUNICATION, 1990, 64 (01): : 65 - 70
  • [34] Programmable accounting management for Virtual Private Networks
    Evlogimenou, A
    Boutaba, R
    NOMS 2002: IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM: MANAGEMENT SOLUTIONS FOR THE NEW COMMUNICATIONS WORLD, 2002, : 297 - 312
  • [35] An active network approach to Virtual Private Networks
    Maresca, R
    D'Arienzo, M
    Esposito, M
    Romano, SP
    Ventre, G
    ISCC 2002: SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2002, : 502 - 507
  • [36] The Genetic Approach for Design of Virtual Private Networks
    Kotenko, Igor
    Saenko, Igor
    2015 IEEE 18TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2015, : 168 - 175
  • [37] Virtual Private Networks - Based Home System
    Volner, R.
    Smrz, V.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2009, (08) : 62 - 64
  • [38] A reliable multicast routing for virtual private networks
    Chung, PT
    CIC'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN COMPUTING, 2003, : 97 - 104
  • [39] Research on tunneling techniques in Virtual Private Networks
    Zhao, AQ
    Yuan, Y
    Ji, Y
    Gu, GQ
    2000 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY PROCEEDINGS, VOLS. I & II, 2000, : 691 - 697
  • [40] Virtual Private Social Networks and a Facebook Implementation
    Conti, Mauro
    Hasani, Arbnor
    Crispo, Bruno
    ACM TRANSACTIONS ON THE WEB, 2013, 7 (03)