Virtual Private Networks (VPNs) provide customers with predictable and secure network connections over a shared network. The recently proposed hose model for VPNs allows for greater flexibility since it permits traffic to and from a hose endpoint to be arbitrarily distributed to other endpoints. In this paper, we develop novel algorithms for provisioning VPNs in the hose model. We connect VPN endpoints using a tree structure and our algorithms attempt to optimize the total bandwidth reserved on edges of the VPN tree. We show that even for the simple scenario in which network links are assumed to have infinite capacity, the general problem of computing the optimal VPN tree is NP hard. Fortunately, for the special case when the ingress and egress bandwidths for each VPN endpoint are equal, we can devise an algorithm for computing the optimal tree whose time complexity is O (mn), where m and n are the number of links and nodes in the network, respectively. We present a novel integer programming formulation for the general VPN tree computation problem (that is, when ingress and egress bandwidths of VPN endpoints are arbitrary) and develop an algorithm that is based on the primal-dual method. Our experimental results with synthetic network graphs indicate that the VPN trees constructed by our proposed algorithms dramatically reduce bandwidth requirements (in many instances, by more than a factor of 2) compared to scenarios in which Steiner trees are employed to connect VPN endpoints.
[1]
Jeffrey Scott Vitter,et al.
e-approximations with minimum packing constraint violation (extended abstract)
,
1992,
STOC '92.
[2]
Dorit S. Hochba,et al.
Approximation Algorithms for NP-Hard Problems
,
1997,
SIGA.
[3]
Dorit S. Hochbaum,et al.
Approximation Algorithms for NP-Hard Problems
,
1996
.
[4]
Yakov Rekhter,et al.
Mpls: Technology and Applications
,
2000
.
[5]
David S. Johnson,et al.
Computers and Intractability: A Guide to the Theory of NP-Completeness
,
1978
.
[6]
Michalis Faloutsos,et al.
On power-law relationships of the Internet topology
,
1999,
SIGCOMM '99.
[7]
Randall J. Atkinson,et al.
Security Architecture for the Internet Protocol
,
1995,
RFC.
[8]
Éva Tardos,et al.
Approximation algorithms for facility location problems (extended abstract)
,
1997,
STOC '97.
[9]
Albert G. Greenberg,et al.
A flexible model for resource management in virtual private networks
,
1999,
SIGCOMM '99.
[10]
BERNARD M. WAXMAN,et al.
Routing of multipoint connections
,
1988,
IEEE J. Sel. Areas Commun..
[11]
Maurice Queyranne,et al.
Structure of a simple scheduling polyhedron
,
1993,
Math. Program..