3
VPN Topology Abstraction Service using Centralized Core Capacity Sharing Scheme Ravishankar Ravindran' Member, IEEE, Changcheng Huang' Senior Member, IEEE, and Krishnaiya Thulasiramarr' Fellow, IEEE (I. Carleton University, Ottawa, 2. Universityof Oklahoma, Norman) Abstract-This paper deals with the problem of sharing VPN serviceprovider's core topology and link state information with its VPNs. This is provided as a service using topology abstraction principles. The topology abstractions are generated considering factors such as VPN SLA requirements, fairness and maximizing core network utilization. The paper deals with algorithms applicable to generate topology abstraction for the VPNs in a centralized manner. In this context we define a problem called the VPN core capacity sharing problem We study this problem using algorithms based on multi-commodity flow theory. We observe from simulation analysis over several topologies that applying the maximum multi-commodity flow based partitioning scheme improves the call performance and network utilization statistics compared to a previously proposed topology abstraction scheme based on maximum concurrentflow theory. I. INTRODUCTION VPN service providers (VSP) and IP-VPN customers have traditionally maintained service demarcation boundaries between their routing and signaling entities, and this has resulted in the VPNs viewing the VSP network as an opaque entity and therefore limiting any meaningful interaction between the VSP and the VPNs. In [1] we addressed this issue by enabling a VSP to share its core topology information with the VPNs as a service in a manner which is both practical and scalable. We used the notion of topology abstraction (TA), which serves as a means of sharing the core topology information as abstract graphs associated with QoS metric information. Our research deals with the abstraction of the available capacity associated with the links of the VSP's core network. The VSP generates the TA for each VPN based on TA SLA parameter set TSk which has two key elements: abstract topology type metric (T k ) and abstract topology refresh interval (R k ). The T k parameter allows a VPN to choose from one of either fully meshed, source-star, star or simple node abstract topologies which we analyzed in [1]. The R k parameter determines the correctness of the abstract topology information at any point of time when compared to the state of the core network. Both these parameters are negotiated between the VPN and the VSP based on factors such as call performance expected from such a service and the criticality of the applications for which the TA service will be used. In [1] we evaluated this novel idea of providing TA service to VPNs in the context of an architecture based on the BGP/MPLS based Ip· VPN solution [4]. The TA for the VPNs can be generated either in a decentralized or a centralized manner. In the decentralized approach the PE nodes serving the set of VPNs generate abstractions independent of one another. In a centralized case, a central manager first generates the partition subgraph for each VPN from which the abstract topology is derived. In [2] we proposed three topology abstraction schemes applicable in a decentralized mode of TA generation. These abstraction schemes differ from one another with respect to degrees of aggressiveness in terms of exposing resources, which result in tradeoffs in terms of VPN call performance metrics and core network utilization. In [3] we studied the problem of generating TA in a centralized manner. We proposed an abstraction scheme based on maximum concurrent flow (MConF) theory, which used the approximation algorithm from [5] for online implementation. In this paper we extend this study of centralized mode of TA generation by applying the maximum multi-commodity flow (MMCF) theory. We demonstrate the improvements achieved by this scheme over MConF based TA scheme using simulation analysis of a IP-VPN scenario implementing the TA service. II. GRAPH THEORY NOTATIONS r:" G(V,E) vg p core network B Sct of all bord er (PE) nodes of the co re network c..r, Set of eWE nodes of VPNk. here 1\ !!; B C" Set of VPNs hosted by border node b Gk.I ,v hEk) Abstrac t topology ofVP N k of topolo gy typ e l TS. TA SLA parameter SCi for VPN k Tk / Rk Abstrac t topology type subscription/Refres h interval of TA for VPN k S(VhE.l:l Partition subgraph for VPNk li j( or I( e» Total capacity of edge (i.j) or e r i.}( or r(e» Residual capacity of edge (i .j) or e U Set of all VPNs provided TA service U, Set of VPNs hosted on node b Z(x,y) Set of VPNs common to border nodes x and y K Set of all commodities in a multicommodity formulation K, Set of all source-destination border node pair commodity ofVPN v Flow of commodity k corrcspondingto rnulticommodity flow (MMCF) formulation Resource partitioned on edge (i .j) for VPN v for source-destination commodityk D(s,,d, ) Demand correspondingto source-destination commodity k III. VPN CAPACITY SHARING PROBLEM In a centralized mode of TA generation, the abstract topology for each VPN k is derived by the central manager from an intermediate subgraph S(Vk,E k ) called as the partition subgraph. The abstract topology GdYk,Ek) is then derived from this partition subgraph. Here, we assume that the VSP adopts a model where the goal is to always expose the available capacity equally among all the VPNs that have

VPN Topology Abstraction Service using Centralized Core ... · PDF fileVPN Topology Abstraction Service using Centralized Core Capacity Sharing ... C" Setof VPNs hosted by border nodeb

  • Upload
    donga

  • View
    223

  • Download
    0

Embed Size (px)

Citation preview

VPN Topology Abstraction Service usingCentralized Core Capacity Sharing Scheme

Ravishankar Ravindran' Member, IEEE, Changcheng Huang' Senior Member, IEEE, andKrishnaiya Thulasiramarr' Fellow, IEEE

(I. Carleton University, Ottawa, 2. UniversityofOklahoma, Norman)

Abstract-This paper deals with the problem of sharing VPNserviceprovider's core topology and link state information with itsVPNs. This is provided as a service using topology abstractionprinciples. The topology abstractions are generated consideringfactors such as VPN SLA requirements, fairness and maximizingcore network utilization. The paper deals with algorithmsapplicable to generate topology abstraction for the VPNs in acentralized manner. In this context we define a problem called theVPN core capacity sharing problem We study this problem usingalgorithms based on multi-commodity flow theory. We observefrom simulation analysis over several topologies that applying themaximum multi-commodity flow based partitioning schemeimproves the call performance and network utilization statisticscompared to a previously proposed topology abstraction schemebased on maximum concurrentflow theory.

I. INTRODUCTION

VPN service providers (VSP) and IP-VPN customers havetraditionally maintained service demarcation boundariesbetween their routing and signaling entities, and this hasresulted in the VPNs viewing the VSP network as an opaqueentity and therefore limiting any meaningful interactionbetween the VSP and the VPNs. In [1] we addressed thisissue by enabling a VSP to share its core topologyinformation with the VPNs as a service in a manner which isboth practical and scalable. We used the notion of topologyabstraction (TA), which serves as a means of sharing the coretopology information as abstract graphs associated with QoSmetric information. Our research deals with the abstractionof the available capacity associated with the links of theVSP's core network. The VSP generates the TA for eachVPN based on TA SLA parameter set TSk which has twokey elements: abstract topology type metric (Tk) and abstracttopology refresh interval (Rk) . The Tk parameter allows aVPN to choose from one of either fully meshed, source-star,star or simple node abstract topologies which we analyzed in[1]. The Rk parameter determines the correctness of theabstract topology information at any point of time whencompared to the state of the core network. Both theseparameters are negotiated between the VPN and the VSPbased on factors such as call performance expected fromsuch a service and the criticality of the applications for whichthe TA service will be used. In [1] we evaluated this novelidea of providing TA service to VPNs in the context of anarchitecture based on the BGP/MPLS based Ip· VPNsolution [4].

The TA for the VPNs can be generated either in adecentralized or a centralized manner. In the decentralizedapproach the PE nodes serving the set of VPNs generateabstractions independent of one another. In a centralized

case, a central manager first generates the partition subgraphfor each VPN from which the abstract topology is derived.

In [2] we proposed three topology abstraction schemesapplicable in a decentralized mode of TA generation. Theseabstraction schemes differ from one another with respect todegrees of aggressiveness in terms of exposing resources,which result in tradeoffs in terms of VPN call performancemetrics and core network utilization. In [3] we studied theproblem of generating TA in a centralized manner. Weproposed an abstraction scheme based on maximumconcurrent flow (MConF) theory, which used theapproximation algorithm from [5] for online implementation.

In this paper we extend this study of centralized mode ofTA generation by applying the maximum multi-commodityflow (MMCF) theory. We demonstrate the improvementsachieved by this scheme over MConF based TA schemeusing simulation analysis of a IP-VPN scenarioimplementing the TA service.

II.GRAPH THEORY NOTATIONS

!--~~~~:~s-r:" ---~--~eh~I~~ -----~~---------~

G(V,E) vg p core network

B Sct of all bord er (PE) nodes of the co re network

c..r, Set of eWE nodes of VPNk. here 1\ !!; B

C" Set of VPNs hosted by border node b

Gk.I,vhEk) Abstrac t topology ofVP N k of topolo gy type l

TS. TA SLA parameter SCi for VPN k

Tk / Rk Abstrac t top ology type subsc ription/Refres h interval of TA for VPN k

S(VhE.l:l Partit ion subgraph for VPN k

l ij( or I( e» Total capacity of edge ( i .j) or e

r i.}( or r(e» Residual capacity of edge (i .j) or e

U Set of all VPNs provided TA service

U, Set of VPNs hosted on node b

Z(x ,y) Set of VPNs common to border nodes x and y

K Set of all commodities in a multicommodity formulation

K, Set of all source-destination border node pair commodity ofVPN v

f~ (k) Flow of commodity k corrcspondingto rnulticommodity flow(MMCF) formulation

Xi~: Resource partitioned onedge (i .j) for VPN v for source-destinationcommodityk

D(s,,d, ) Demand correspondingto source-destinationcommodity k

III. VPN CAPACITY SHARING PROBLEM

In a centralized mode of TA generation, the abstracttopology for each VPN k is derived by the central managerfrom an intermediate subgraph S(Vk,Ek) called as thepartition subgraph. The abstract topology GdYk,Ek) is thenderived from this partition subgraph. Here, we assume thatthe VSP adopts a model where the goal is to always exposethe available capacity equally among all the VPNs that have

subscribed to the same abstract topology type parameter Ti.This fairness policy guarantees that two VPNs sharing a pairof border nodes x and y and provided with the same TA typewill have the same amount of bandwidth associated with thevirtual link (x, y) in their respective abstract topologies.

A. Objectives ofVPN Capacity Sharing

First, the goal of TA service is to enable better callperformance of the VPNs making capacity requests. We usethe VPN success ratio to measure VPN call performance.This parameter is a measure of making right bandwidthrequest decisions by a VPN using the abstraction provided toit by the VSP. The second objective is to ensure the bestpossible use of the VSP's available core capacity resource sothat the VSP's network utilization is maximized. The thirdcriterion we consider while computing subgraphs for theVPNs is to ensure that the schemes are fair to all the VPNswith respect to sharing the resources, in line with the fairnesspolicy discussed earlier.

B. Definition ofVPN Capacity Sharing Problem

Considering these objectives we defme the VPN capacitysharing problem as follows:

VPN-Capacity Sharing Problem (VPN-CS):

Given a graph G(V,E) representing the core network of theVSP providing topology abstraction service to the set ofVPNs, U, the objective is to compute fair partitions S(V",Ek)for each VPN ke V of the network so as to maximize theVPN success ratio and core network utilization. If

x; represents the resource identified as part of subgraph

S(V",Ek) on edge eeE and for VPN kEU, then LX; :s; t(e) ,keU

VeeE. Recall that t(e) is the total capacity ofthe link e.

Using the relationship between the maximization objectivesof the VPN-CS problem and their relation to total abstractedcapacity, which is the sum of the link capacities in thepartition graphs S(V",Ek) for ke V, we formulate the VPN­CS problem using multi-commodity flow theory.

In [3] we studied this problem using the maximumconcurrent flow (MConF) approach. The objective of theMConF formulation is to maximize the factor fJ such thatthere exists a flow that satisfies the demand fJ*Dis; di) , V i=1, 2, ... k. Here (si, di) represents a source-destination pair andthe flow between s, and d, is considered as a commodity. Weproposed a solution for the VPN-CS problem applying theapproximation algorithm from [5]. For the MConF basedpartitioning heuristic, D(Si ,di) is set to the maximum flowbetween the source-destination pair.

There is a drawback in applying the MConF basedapproach to solve the VPN-CS problem. The throughputachieved by the MConF formulation with the values of thecommodities set to their maximum flow values can tum outto be conservative in some cases. This happens because theedges of the paths corresponding to a commodity'smaximum flow are also shared by other commodities; this

2

forces the same fraction of the demand to be satisfied for allthe commodities resulting in conservative topologyabstractions. This inefficiency can be addressed bymaximizing the sum of the independent commodity flows.Hence we propose the use of maximum multi-commodityflow formulation for the VPN-CS problem.

C. Maximum Multi-Commodity Flow (MMCF)Approach

The node-link MMCF formulation is as follows:

Maximize Lfmc(k)Subject To: kEK

LX~j - LX~,i = fmc(k) Vke K, i = Sk (1)(i,j)EE (j,i)EE

LX~j - LX~,i =0 VkeK,i*sk,i*dk (2)(i,j)EE (j,i)EE

L Xi~j - L X~,i = - fmc(k) Vk e K, i = d k (3)(i,j)EE (j,i)EE

LX~j »: V(i,j)eE (4)kEK

X~j ~ 0 fmc(k) ~ 0

We next propose the MMCF based subgraph partitioningscheme.

D.MMCF Based Partitioning Scheme for VPN-CS Problem

In order to reduce the complexity of the execution time andmemory requirement of solving the multi-commodity flowproblem, we apply the MMCF formulation on an aggregatedset of source-destination commodity pairs. For this, we defme acommodity as a source-destination border node pair (s,d) thathas a potential of a VPN bandwidth request from s to d. This isthe case if the source-destination border nodes sand d host atleast one common VPN; in this case, it will satisfy the criteriaI(VsnVd)l;;::: 1. We defme the set ofVPNs with a common (s,d)pair as Z(s,d). This aggregation reduces the commoditycomplexity to O(IBI2

) . Once the resource allocation for thecommodities is achieved by solving the MMCF problem, wethen fairly distribute the resources corresponding to theaggregate commodity among the VPNs in the set Z(s,d), fromwhich the partition subgraph is generated. Based on thisdiscussion, we next propose the MMCF based centralizedheuristic to address the VPN-CS problem.

Maximum Multi-commodity Flow Based PartitioningSchemeInput: G(V,E), B, V, o, VbeBOutput: S(Vv, Ev), Gv,lVv,Ev) Vv eVStep 1: For each potential border node pair (s,d) , identifythe set Z(s,d) . Defme commodity set K = {(s, d): IZ(s, d)1>0};Step 2: For the commodity set K, solve the maximum multi­commodity flow problem. The solution e represents the

1,]

resource associated with commodity k over edge (i,j) eE;Step 3:For each commodity pair (sk,dk)eK , we divide theedge flows fairly among the VPNs in the set Z(s",dk) as

follows,. We set x :'~ = »:IIZ(Sk, dk)1 V (i,j) eE and x~. >0;1,) 1,) 1,)

(Here xv,k is the virtual capacity assigned to VPN v on linkI,J

(i,j) for VPN source-destination pair (sk"dt)e Kv. )

Step 4: For all VPN ve U, create subgraph S(Vv, Ev) , where

Vvc V and Ex: E is the set of all links such that <ik >0 for

at least one commodity ke K; ofVPN v. The capacity of eachlink (i,j) in S(V", Ev) is the sum of the flows xv,k V ke K; ;

I, J

Step 5: For each VPN v, distribute S(V", Ev) to P; ;Step 6: Nodes P; uses S(V", E v) to generate GviV",Ev) foreach VPN.

IV. SIMULAnON STUDY

Here we compare the performance of the proposed MMCFbased partitioning scheme with the MConF basedpartitioning scheme from [3] using simulation analysis. Foronline implementation, [5] proposed the fastest e­approximation algorithm for the MMCF problem which weapply in Step 2 of the MMCF based scheme. For analysis, weset (I-e) value to 0.3; this achieves FPTAS execution time ofless than 1s.Performance Metrics:We compare the performance using the following metrics.Success Ratio:SuccessRatio= Numberof calls correctly accepted+ Numberof calls correctly rejected

Totalnumber of calls

Network Utilization:k TT 'li .:cA""ggr"--,,eg"-.a_te_u_til-,iz:-ed-:-li_nk_c-:,a'P_a_cl...::....·tyAverage Networ vti tzatton =-

Aggregate link capacityAbstraction Efficiency:

Aggregale commodity flow over all linksAbstraction Efficiency = ~"'-""=':'--"-''::'':'--'--'--''--''-----

. . S Aggregate capacity of all linksSimulation etup:The simulation analysis was conducted using OPNET on arandom network topology and two European networks.Because of the correlation of performance characteristics forthe three topologies, we report results only for the randomnetwork topology. The simulation models a VSP providingTA service over a BGP/MPLS based L3 VPN solution [4]. Inaddition, a central manager that executes the partitioningsolutions proposed for the VPN-CS problem was alsoimplemented.

For the sake of analysis, all the VPNs are assumed tosubscribe to the source-star abstraction [1]. The mean callinter-arrival time and the mean holding time are assumed tobe exponentially distributed, with capacity request beinguniformly distributed between [1-500] units. The loadoffered to the network is varied by varying the mean callholding times in the range of [10, 1000]s keeping the meaninter-arrival time constant at 100s. The constant abstracttopology update interval Rk is also initialized to the samevalue as the mean inter-arrival time of the call requests. Thesimulation was set to collect statistics for 30 independentreplications, with each replication generating over 3000 callsto achieve an absolute error of less than 1% and C.I of 95%.Due to space limitation only two graphs containingsimulation results are presented in Fig.l(a) and (b). Moredetailed analyses are in [6].Observations based on Fig. l(a) and (b):Here we briefly summarize the improvement achieved byemploying MMCF based partitioning scheme.

3

The MMCF based partitioning algorithm performed on anaverage 5% better than the MConF based approach withrespect to the success ratio metric. This gain in performanceis due to gain in abstraction efficiency. We observed thatMMCF's performance in terms of abstraction efficiency wason an average 20% better than the MConF based scheme.The better call performance and abstraction efficiency of theMMCF based approach also resulted in better networkutilization in the range of 5% for various load conditionsover the MConF based approach.

Abstraction Effi c iencyfSuccess Rati o Comparison 01MConF and MMCF TA

120SCheme s

;ft'0' 100

~ -.....:::::~~ 80

~ F=f!!1 -~ 60~ --;,r~

_ MConFPbstraction Efficiency......§ 40 -

) 20

_ MMCF Abstraction Efficiency

- _ MConF SUccessRatio

<___MMCF Success Ratio

0

0.1 0.5 1 3 5 10 15l oad (H)

Fig. I(a): Comparison ofAbstraction Efficiency and Success Ratio

VSP Core Network Utili zation35

-+-MConF Network Utilization I30 ___ MMCF Network Utilization

[7./

l 25

1/ 1/.~1; 20

/ /"5~ 15

l.---(;

/ ~~z 10

~/5

~0 - l--==""

0.1 0.5 1 3 5 10 15Load (H)

Fig. I(b): Comparison ofNetwork Utilization

V.CONCLUSIONS

In summary, the study in this paper demonstrated howMMCF based partitioning heuristic can be used to improvethe call performance and network utilization when TA isgenerated in a centralized manner for TA service. This iscompared to the case when MConF based partitioningscheme is applied.

REFERENCES[I) Ravi Ravindran, Changcheng Huang, and K.Thulasiraman, "TopologyAggregation as a VPN Service", Proc. oflEEE ICC, pp. 105-109,2005.(2) Ravi Ravindran, Changcheng Huang, and K.Thulasiraman, "A DynamicManaged VPN Service: Architecture and Algorithms", Proc. ofIEEE ICC, pp.664 - 669, 2006.(3) Ravi Ravindran, Changcheng Huang, and K.Thulasiraman, "A DynamicManaged VPN Service: Capacity Sharing Based On Maximum Concurrent FlowTheory", Proc.oflEEE ICC, Vol. 2. pp.211 - 216. 2007.(4) E. Rosen and Y. Rekter, "BGPIMPLSVirtual Private Networks", RFC 4364,IETF,2006.(5) Lisa K. Fleischer, "Approximating Fractional Multicommodity FlowIndependent ofthe Number ofCommodities", Proc.ofIEEE, Annual SymposiumofFoundations ofComputer Science. pp. 24-31.1999.(6) Ravi Ravindran, "Topology Abstraction Service for IP Virtual PrivateNetworks", Ph.D.Thesis, Carleton University, April, 2009.