COMPARATIVE ANALYSIS OF DYNAMIC VIRTUAL PRIVATE NETWORKS RESOURCE ALLOCATION SCHEMES

TABLE OF CONTENTS
APPROVAL PAGE
CERTIFICATION
DECLARATION
DEDICATION
ABSTRACT
TABLE OF CONTENTS
LIST OF FIGURES
LIST OF TABLES

CHAPTER 1:  INTRODUCTION
BACKGROUND OF STUDY
PROBLEM STATEMENT
OBJECTIVE
SCOPE
SIGNIFICANCE OF STUDY
METHODOLOGY
WORK OUTLINE

CHAPTER 2:  LITERATURE REVIEW
2.1       MULTI-PROTOCOL LABEL SWITCHING (MPLS)
2.2       THE MPLS SYSTEM
2.2.1    FORWARDING EQUIVALENCY CLASS
2.2.2    MPLS LABELS
2.3       THE MPLS ARCHITECTURE
2.3.1    DATA PLANE
2.3.2    PUSH OPERATION:
2.3.3    SWAP OPERATION:
2.3.4    POP OPERATION:
2.4       CONTROL PLANE
2.4.1    LABEL INFORMATION BASE
2.4.2    LABEL FORWARDING INFORMATION BASE (LFIB)
2.5       MPLS VPN
2.5.1    MPLS VPN DEVICES
2.5.2    VPN ROUTING AND FORWARDING
2.5.3    ROUTE PROPAGATION IN MPLS VPN
2.6       MPLS QOS
2.6.1    TRAFFIC ENGINEERING IN MPLS NETWORK
2.7       VPN QOS REQUIREMENTS
2.8       MPLS VPN SUPPORT OF QOS
2.8.1    PIPE MODEL
2.8.2    HOSE MODEL
2.9       VPN QOS PHB
2.10     RELATED WORKS IN VPN QOS PROVISIONING
2.11     SUMMARY

CHAPTER 3: MODELLING
3.1       ROBUST DYNAMICAL VIRTUAL NETWORK PROVISIONING (RDVNP)
3.2       DYNAMIC BANDWIDTH ALLOCATION AND GUARANTEE ON RESOURCE FAIRNESS (DWARF-NET)
3.3       NETWORK ARCHITECTURE
3.4       PHYSICAL MODEL
3.5       SIMULATION VALIDATION

CHAPTER 4: SIMULATION
4.1       MATLAB SIMULATION
4.2       RESULT

CHAPTER 5: CONCLUSION
5.1       RECOMMENDATIONS
5.2       CONTRIBUTIONS
5.3       FURTHER WORK
REFERENCES

ABSTRACT

The need for high performance resource allocation schemes for Virtual Private Networks (VPNs) has led to the proliferation of algorithms for VPN resource allocation. It was found that most works on VPN resource allocation focused either on admission control or link reservation on the network. Also, review of relevant literatures have revealed the need for a resource allocation/scheduling scheme whose algorithm will be able to allocate bandwidth and memory resources to different VPNS sharing the same link to the network service provider. Resources should be allocated in such a manner that utilization is optimal while VPN endpoints or customers receive services that does not undermine the service-level agreement (SLA) with the service provider. MATLAB Simulink was used to design a simulation model for analysing the VPN access network obtaining and comparing results for the link bandwidth utilization, buffer memory utilization and packet loss rate performances of the RDVNP (Robust Dynamic Virtual Network Provisioning) algorithm against the DWARF-Net (Dynamic bandWidth Allocation and guarantee on Resource Fairness) algorithm. From the results obtained, DWARF-Net algorithm’s performance was better than the RDVNP’s algorithm in almost all parameters tested on. On bandwidth utilization, DWARF-Net had an average channel utilization of 61.23% against RDVNP’s 48.28%. on buffer utilization 42% for DWARF-Net, 41% for RDVNP and average loss rate average of 1 Packet/second for DWARF-Net against 20 Packets/second for RDVNP. From the simulation analysis and result of this work, DWARF-Net was recommended to researchers as an optimal performing algorithm for VPN resource allocation.

CHAPTER ONE
INTRODUCTION
 BACKGROUND OF STUDY
For long, traditional Private Networks (PNs) were established by connecting Private Network sites (e.g., campuses or branch offices of enterprises) with leased lines over a Wide Area Network (WAN). Since these lines were dedicated lines, Security and bandwidth guarantees were assured[1]. As enterprises and other customer’s network sites proliferated and spread globally, the number of endpoints of PN’s sites has spread while the endpoints got more geographically dispersed. The distance between endpoints in a Private Network is directly proportional to the fee or cost of providing the links in the private network. Thus, connecting a large number of dispersed PN sites with dedicated lines became very expensive. As a result, there was a need for a cheaper readily available alternative to the PNs. The remedy was provided by developing the Virtual Private Network (VPN) services which ran over the public network’s backbone or over the public Internet. This method has been quite successful in making VPNs ubiquitous in interconnecting Private network sites.

A Virtual Private Network is described as “a way to simulate a Private Network over a Public network, such as the Internet” [2]. It is called "Virtual" because it depends on the use of virtual connections; that is, temporary connections that have no real physical presence, but consist of packets routed over various machines on the Internet on an ad hoc basis. Secure virtual connections can be created between two machines, a machine and a network, or two networks....

For more Electrical Electronics Engineering Projects click here
================================================================
Item Type: Postgraduate Material  |  Attribute: 89 pages  |  Chapters: 1-5
Format: MS Word  |  Price: N3,000  |  Delivery: Within 30Mins.
================================================================

Share:

No comments:

Post a Comment

Select Your Department

Featured Post

Reporting and discussing your findings

This page deals with the central part of the thesis, where you present the data that forms the basis of your investigation, shaped by the...

Followers