Provisioning Restorable Virtual Private Networks Using Barabasi and Waxman Topology Generation Model

نویسنده

  • R. Ravi
چکیده

As internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks. They are firewall, virtual private networks and encryption algorithms. Out of these, the virtual private network plays a vital role in preventing hackers from accessing the networks. A Virtual Private Network (VPN) provides end users with a way to privately access information on their network over a public network infrastructure such as the internet. Using a technique called “Tunneling”, data packets are transmitted across a public routed network, such as the internet that simulates a point-to-point connection. Virtual private networks provide customers with a secure and low-cost communication environment. The basic structure of the virtual circuit is to create a logical path from the source port to the destination port. This path may incorporate many hops between routers for the formation of the circuit. The final, logical path or virtual circuit acts in the same way as a direct connection between the two ports. Our proposed Provisioning Restorable Virtual Private Networks Algorithm (PRA) is used to combine the provisioning and restoration algorithms to achieve better results than the ones obtained by independent restoration and provisioning. In order to ensure service quality and availability in Virtual Private Networks, seamless recovery from failures is essential. The quality of service of the Virtual Private Networks is also improved due to the combination of provisioning and restoration. The bandwidth sharing concept is also applied in link to improve the quality of service in the Virtual Private Network. The performance analysis of the proposed algorithm is carried out in terms of cost, the number of nodes, the number of VPN nodes, delay, asymmetric ratio and delay with constraints with Disjoint Path Algorithm and Approximation Restoration Virtual Private Networks Algorithm. The Provisioning Restorable Virtual Private Networks Algorithm performs better than the Disjoint Path Algorithm.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Analysis of Rejection Ratio in Cost Optimized Virtual Private Networks Provisioning Algorithm (COVPA) Using Waxman and Barabasi Model in Cyber Space

Problem statement: Virtual private networks have provided customers with a secure and low-cost communication environment. Approach: The COVPA, the provisioning algorithm for a Virtual Private Network service, which built and managed VPNs on demand. Results: The COVPA allowed each VPN to have guaranteed resources and customized control and supported a highly dynamic VPN service where creation an...

متن کامل

R. Ravi: Enhanced Provisioning Algorithm for Virtual Private Network in Hose Model with Quality of Service Support Using Waxman Model

As Internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks. They are firewall, virtual private networks and encryption algorithms. Out of these, the virtual private network plays a vital role in preventing ha...

متن کامل

On Bandwidth Efficiency of the Hose Resource Management Model in Virtual Private Networks

The hose resource provisioning model promises to provide an easy–to–use characterization framework for Virtual Private Network service offerings. Significant research effort has recently been spent on proposing new algorithms for provisioning cost–optimal networks specified according to this new model. However, a detailed comparison of the bandwidth requirement for networks designed based on th...

متن کامل

EVT: Evolutionary Algorithm for VPN Tree Provisioning

A Virtual Private Network (VPN) is an overlay network defined over a public network infrastructure like the Internet. A VPN provides customers with a secure, low cost, and more flexible communication environment than leased lines. The allocation of bandwidth for VPNs to meet the requirements specified by customers is an important traffic engineering research issue. A VPN workload model called h...

متن کامل

Provisioning virtual private networks under traffic uncertainty

We investigate a network design problem under traffic uncertainty which arises when provisioning Virtual Private Networks (VPNs): given a set of terminals that must communicate with one another, and a set of possible traffic matrices, sufficient capacity has to be reserved on the links of the large underlying public network so as to support all possible traffic matrices while minimizing the tot...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011