COMPARATIVE ANALYSIS OF DYNAMIC VIRTUAL PRIVATE NETWORKS RESOURCE ALLOCATION SCHEMES

TABLE OF CONTENTS
APPROVAL PAGE
CERTIFICATION
DECLARATION
DEDICATION
ABSTRACT
TABLE OF CONTENTS
LIST OF FIGURES
LIST OF TABLES

CHAPTER 1:  INTRODUCTION
BACKGROUND OF STUDY
PROBLEM STATEMENT
OBJECTIVE
SCOPE
SIGNIFICANCE OF STUDY
METHODOLOGY
WORK OUTLINE

CHAPTER 2:  LITERATURE REVIEW
2.1       MULTI-PROTOCOL LABEL SWITCHING (MPLS)
2.2       THE MPLS SYSTEM
2.2.1    FORWARDING EQUIVALENCY CLASS
2.2.2    MPLS LABELS
2.3       THE MPLS ARCHITECTURE
2.3.1    DATA PLANE
2.3.2    PUSH OPERATION:
2.3.3    SWAP OPERATION:
2.3.4    POP OPERATION:
2.4       CONTROL PLANE
2.4.1    LABEL INFORMATION BASE
2.4.2    LABEL FORWARDING INFORMATION BASE (LFIB)
2.5       MPLS VPN
2.5.1    MPLS VPN DEVICES
2.5.2    VPN ROUTING AND FORWARDING
2.5.3    ROUTE PROPAGATION IN MPLS VPN
2.6       MPLS QOS
2.6.1    TRAFFIC ENGINEERING IN MPLS NETWORK
2.7       VPN QOS REQUIREMENTS
2.8       MPLS VPN SUPPORT OF QOS
2.8.1    PIPE MODEL
2.8.2    HOSE MODEL
2.9       VPN QOS PHB
2.10     RELATED WORKS IN VPN QOS PROVISIONING
2.11     SUMMARY

CHAPTER 3: MODELLING
3.1       ROBUST DYNAMICAL VIRTUAL NETWORK PROVISIONING (RDVNP)
3.2       DYNAMIC BANDWIDTH ALLOCATION AND GUARANTEE ON RESOURCE FAIRNESS (DWARF-NET)
3.3       NETWORK ARCHITECTURE
3.4       PHYSICAL MODEL
3.5       SIMULATION VALIDATION

CHAPTER 4: SIMULATION
4.1       MATLAB SIMULATION
4.2       RESULT

CHAPTER 5: CONCLUSION
5.1       RECOMMENDATIONS
5.2       CONTRIBUTIONS
5.3       FURTHER WORK
REFERENCES


ABSTRACT
The need for high performance resource allocation schemes for Virtual Private Networks (VPNs) has led to the proliferation of algorithms for VPN resource allocation. It was found that most works on VPN resource allocation focused either on admission control or link reservation on the network. Also, review of relevant literatures have revealed the need for a resource allocation/scheduling scheme whose algorithm will be able to allocate bandwidth and memory resources to different VPNS sharing the same link to the network service provider. Resources should be allocated in such a manner that utilization is optimal while VPN endpoints or customers receive services that does not undermine the service-level agreement (SLA) with the service provider. MATLAB Simulink was used to design a simulation model for analysing the VPN access network obtaining and comparing results for the link bandwidth utilization, buffer memory utilization and packet loss rate performances of the RDVNP (Robust Dynamic Virtual Network Provisioning) algorithm against the DWARF-Net (Dynamic bandWidth Allocation and guarantee on Resource Fairness) algorithm. From the results obtained, DWARF-Net algorithm’s performance was better than the RDVNP’s algorithm in almost all parameters tested on. On bandwidth utilization, DWARF-Net had an average channel utilization of 61.23% against RDVNP’s 48.28%. on buffer utilization 42% for DWARF-Net, 41% for RDVNP and average loss rate average of 1 Packet/second for DWARF-Net against 20 Packets/second for RDVNP. From the simulation analysis and result of this work, DWARF-Net was recommended to researchers as an optimal performing algorithm for VPN resource allocation.


CHAPTER ONE
INTRODUCTION

 BACKGROUND OF STUDY
For long, traditional Private Networks (PNs) were established by connecting Private Network sites (e.g., campuses or branch offices of enterprises) with leased lines over a Wide Area Network (WAN). Since these lines were dedicated lines, Security and bandwidth guarantees were assured[1]. As enterprises and other customer’s network sites proliferated and spread globally, the number of endpoints of PN’s sites has spread while the endpoints got more geographically dispersed. The distance between endpoints in a Private Network is directly proportional to the fee or cost of providing the links in the private network. Thus, connecting a large number of dispersed PN sites with dedicated lines became very expensive. As a result, there was a need for a cheaper readily available alternative to the PNs. The remedy was provided by developing the Virtual Private Network (VPN) services which ran over the public network’s backbone or over the public Internet. This method has been quite successful in making VPNs ubiquitous in interconnecting Private network sites.

A Virtual Private Network is described as “a way to simulate a Private Network over a Public network, such as the Internet” [2]. It is called "Virtual" because it depends on the use of virtual connections; that is, temporary connections that have no real physical presence, but consist of packets routed over various machines on the Internet on an ad hoc basis. Secure virtual connections can be created between two machines, a machine and a network, or two networks....

For more Electronic Engineering Projects Click here
================================================================
Item Type: Project Material  |  Size: 89 pages  |  Chapters: 1-5
Format: MS Word   Delivery: Within 30Mins.
================================================================

Share:

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Search for your topic here

See full list of Project Topics under your Department Here!

Featured Post

HOW TO WRITE A RESEARCH HYPOTHESIS

A hypothesis is a description of a pattern in nature or an explanation about some real-world phenomenon that can be tested through observ...

Popular Posts