ATM virtual private network design...
Transcript of ATM virtual private network design...
ATM virtual private network design alternatives P Crocetti*, S Fotedart, L Frattat, G Gallassi* and M Gerlaj
An ATM virtual private network (AVPN) offers to a multi- site customer an ATM transport service based on a ‘virtual’ topology of dedicated VPs embedded in a larger ATM
backbone. The goal of AVPN is to allow the efficient and flexible use of the resources by giving to the customer considerable autonomy in managing such resources. In this paper, we show how this goal can be achieved by exploiting standard ATM features. We also show that a critical issue in AVPN design is congestion control within an AVPN and
prevention of interference across different AVPNs. We propose various design alternatives for AVPNs, evaluate their
performance and compare their congestion control and dynamic bandwidth allocation features.
Keywords: virtual private networks, ATM, congestion control
ATM technology makes it easy to ‘embed’ a virtual
private network (VPN) in an ATM network (AVPN). The key enabling mechanism is the virtual path (VP)
concept, a standard feature which permits establishment of a virtual connection with associated bandwidth
between any two points. In the end-to-end application, the user can multiplex several virtual circuits (VC)
within the VP, and can thus regard it as a privately owned facility. A multi-site user, by establishing several
VPs between all of its sites, can construct a VPN. Recently, this concept of VPN has been extended’ by proposing an embedded network which consists of provisioned VP links maintained between user sites and ATM nodes, as well as between pairs of ATM nodes. In
addition, the proposed network supports a logical
meshed interconnection between user sites realized using VCs. Different to the end-to-end VP case, the
ATM nodes must switch not only the VPs, but also the VCs within each VP. Clearly, this additional flexibility offers several advantages to the user in terms of dynamic utilization of bandwidth, but still leaves some
*Italtel, Milan, Italy ‘Politecnico di Milano, Italy tComputer Science Department. UCLA, 37328 Boelter Hall, Los Angeles, CA 90024, USA (Email: [email protected])
problems open, such as contentions resolution for ATM
resources. It is expected that the concept of VPNs built on top of
ATM will be very attractive, especially in the early stages of ATM introduction. This is because AVPN can be used very effectively as a backbone to interconnect the
geographically spread sites of a large customer. Consider, for example, a customer with several LANs
(e.g. ATM LANs) which need to be interconnected. One solution is to use the standard, public ATM network
service. This, however, may not provide the desired
flexibility and control over network resources, Another
solution is to build and operate a privately owned nationwide ATM network. However, this involves a
major cost investment, and poses technology risks as well as limitations (e.g. lack of growth flexibility). Yet
another approach is SMDSjCBDS on top of ATM233. It must be pointed out, however, that SMDSjCBDS has
some limitations of its own, as it only supports connectionless data traffic, while future LANs will be increasingly moving towards integrated, multimedia type
traffic. It appears that AVPN is an attractive compro- mise among the above approaches, in that it combines
their advantages without suffering from many of the
limitations. Of course, there is less statistical multiplexing flexibility than in SMDS/CBDS. Also, the user is billed
for VP bandwidth, even when he does not use it. It is then the user’s responsibility to ensure efficient use of the bandwidth. Clearly, the customer must take on a more active role in managing network resources. In summary,
the objective of AVPN is to offer to a multi-site customer a transport service, based on an ATM backbone,
allowing an efficient and flexible use of resources in a changing traffic environment. This is achieved by
exploiting the virtual levels typical of the ATM, and by delegating the AVPN traffic management to the user, and yet enabling the public network to guarantee the QoS through proper traffic control functionalities.
The main focus of this paper is the analysis of alternative strategies for AVPN, their functional impli- cations and related performance. First, we identify the alternatives for AVPN implementation. For each alter-
24
0140-3664/95/$09.50 6:~ 1995-Elsevier Science B.V. All rights reserved
SSD/O140-3664 (94)00748-g
computer communications volume 18 number 1 january 1995
ATM VPN design alternatives: P Crocetti et al.
native, we describe the functionalities, examine the
critical bandwidth allocation and traffic control
aspects, and evaluate the impact of the protocol
implementations on the ATM node. We then compare the alternatives, both qualitatively and using simple
numerical examples. Finally, we address possible exten- sions to the proposed architectures.
ATM VIRTUAL PRIVATE NETWORK ALTERNATIVES
The simplest solution for an ATM-based VPN is to use
end-to-end VPs (EEVP). A user with a number of sites will interconnect them with a fully interconnected VP
mesh. The ATM network allocates peak bandwidth to VPs and performs peak bandwidth policing on each VP
accordingly. The user can multiplex several VCs within each VP. A major advantage of this scheme is that the user has full control of the VP bandwidth: he can
statistically multiplex several sessions as needed in a way
which is totally transparent to the ATM network. A serious drawback of the EEVP strategy, however, is
bandwidth fragmentation over many VPs, especially with
a large number of sites. The side-effects of fragmentation are the inability to enjoy statistical multiplexing advan-
tages of traffic across VP pipes, and the lack of flexibility
in adjusting to traffic pattern changes. These problems can be solved efficiently by using the
strategy recently proposed by Walters and Ahmed’ under the name of broadband virtual private network (BVPN). The BVPN is a virtual subnet embedded in ATM, which consists of VP links connecting user sites
and ATM nodes (Figz4re I). As in the EEVP strategy,
the user is allocated peak bandwidth on the VPS. However, a logical mesh of VCs is defined, where the
VCs are not confined to a single end-to-end VP, but may traverse several VPs. During the data transfer
phase, a temporary association of bandwidth to the VCs of the logical network is realized. Thus, in this case, the network provides not only VP cross-connection, but
also VC cross-connection. The BVPN solution offers considerable advantages to users: first, each traffic
stream, between different source/destination sites, can statistically share a common VP when their paths
overlap; second, traffic pattern changes can be more easily absorbed by a well designed VP topology, without requiring dynamic reallocation of bandwidth, as in the
EEVP strategy.
In this approach, the ATM node must perform some
extra work: first, the ATM node, an ATM Cross Connect (XC) for instance, must now cross-connect not only VPs but also VCs. So, VC routing maps must
be maintained. Another important concern is VP traffic
policing, which is required at each VP segment. Furthermore, VP policing cannot protect the ATM XC from internal congestion caused by changes in traffic patterns. For instance, consider the ATM XC ‘A’ in Figure 1. Assume that initially the traffic into and out of node A is balanced, and therefore bandwidth allocation
Figure I BVPN concept
is the same value for VPs 1, 2, 3 and 4. Accordingly, the
input VP policing parameters are set to the same peak value. Because of traffic fluctuations, it is possible that
during a period, all traffic entering from VPs 1 and 2 goes out to VP 4. Clearly, this overload will cause
congestion in VP 4. Yet ‘output’ policing on VP 4
cannot protect the node from congestion (i.e. internal
buffers may overflow, thus degrading QoS guaranteed to other ATM users). Thus, more elaborate traffic control policies are required.
The problem left open in the BVPN concept, in the definition given by Walters and Ahmed’, is the conten- tion resolution caused by changes in the traffic flows.
Two kinds of approach can be used to solve the problem: either to define a reservation procedure for
traffic acceptance and bandwidth allocation; or to set some limits on resource utilization and flexibility.
Finally, two strategies which follow the above-
mentioned approaches are presented: fast resource management (FRM) and intra-node policing (INP). Before discussing the schemes, it is necessary to
identify the main entities in our network reference scenario (Figure 1). We consider a public network,
which consists of ATM XC nodes, an ATM network manager and a private user who, at each site, has a local
customer manager (LCM) and, optionally, a central customer manager (CCM) to coordinate the LCM operations.
FAST RESOURCE MANAGEMENT FOR AVPN
In the FRM strategy, the user requests peak bandwidth allocation for each incoming burst of traffic or connec- tion. When a burst arrives at the user’s LCM, a fast reservation cell is issued on the proper VC. The first ATM XC on the path verifies that the request can be accepted on the incoming and outgoing VPs (i.e. it keeps track of user bandwidth allocation on VP links).
computer communications volume 18 number 1 january 1995 25
ATM VPN design alternatives: P Crocetti et al
Then, it forwards the fast reservation request to the next node along the path, which in turn verifies that the request can bc accepted on the next VP. In this first phase, 21 bandwidth booking procedure is performed at each node. If the reservation is not blocked, the last
node in the path returns an acknowledgment to the origin, rcscrving bandwidth on the way back and updating the input VC policer in the ingress node. The
sourcc is notified of acceptance, which then issues the burst. Marc detailed examples of protocols can be
found elsewhere4.“.
This scheme clearly protects the ATM XC from congestion, since it polices all the VCs individually, and
thus ensures that the allocated VP bandwidth is never exceeded. It also supports dynamic user bandwidth allocation. The scheme, however, has some drawbacks:
l round trip delay and processing overheads degrade efficiency
0 the procedure is non-transparent to ATM (i.e. the
ATM XC must keep track of user bandwidth allocation)
0 additional hardware and software are required in the ATM XC.
INTRA-NODE POLICING FOR AVPN
Consider F~‘gurc 2, and assume that the input traffic from VP I is split into rates RI3 and RI4 directed to VPs 3 and 4, respectively. Similarly, VP 2 is split into
R23 and R24. The condition to avoid internal node (i.e.
ATM XC) congestion is that RI3 + R23 < peak
bandwidth allocated to VP 3. Ideally. we would like to jointly police the sum RI3 and R23. Unfortunately this is not possible. since these two traffic streams enter from
two different exchange terminations. Policing requires counting cells in real-time, and
therefore it can be performed only on the exchange
termination on which the traffic stream is entering. Therefore. a more realistic solution entails the policing
of RI 3 and R23 separately. This policing strategy, which we call intra-node policing (INP), is quite easy to implement. It simply requires keeping ;I common
policing counter for all the VCs which are routed from
VP I to VP 3. If RI3 and R23 are chosen so that R I3 + R23 < peak bandwidth allocated on VP 3, nodal
congestion is prevented. Thus the scheme is fail-safe.
ATM XC
However, from the user performance standpoint, this scheme is quite conservative, since it does not allow statistical multiplexing of the streams corresponding to RI3 and R23. Conceptually, it is as if artificial
‘Intranode-Virtual Path’ (I-VP) links were introduced
between the original internodal VPs. These I-VPs clearly pose further constraints on user bandwidth allocation,
and may, in some cases, become undesirable bottle-
necks, unless properly chosen.
In a static I-VP assignment, the I-VP policing parameters are selected at the AVPN set up. The
policers on each I-VP enforce the assigned parameters to prevent congestion in the ATM network. To accept a
new session the LCM requests an access permit to its privately owned CCM. The CCM is. therefore, updated
on the actual traffic in the AVPN. and may accept or reject the new session based on peak or statistical
multiplexing criteria applied to the I-VP involved. In this case, the INP operation is completely transparent to
the ATM XC. Unintentional or malicious misfunc-
tioning of LCM or CCM has an impact only within the
AVPN. All other users preserve their guaranteed
performance in the ATM network. A drawback of static I-VP assignment is poor
performance when AVPN traffic patterns change substantially. This may be corrected by allowing the
user to change the I-VP policer parameters. The implementation of such an alternative, however. requires the existence of ATM signalling and the use of
more sophisticated procedures. If these features are available. the CCM periodically readjusts the thresh-
olds so that they are consistent with the traffic pattern.
Each ATM XC, of course. checks the new thresholds for consistency. The fragmentation problem here is mitigated by the fact that the I-VP bandwidth alloca-
tions are matched to the actual user traffic pattern.
FUNCTIONAL COMPARISON
Each of the three AVPN schemes described in the previous section has a different impact in terms of functional requirements for supporting the ATM network. To evaluate and compare their impacts. it is
necessary to define the basic functions needed to run an AVPN. For the sake of clarity. we refer to the following
phases in AVPN operation:
0 network set-up. which includes all actions needed to intialize AVPN
l connection acceptance. which is in charge of all decisions related to the acceptance of incoming connections into the AVPN
l data transfer. which controls the data transfer during connections.
Ttrhk~~ I summarizes for each basic function and for the different schemes the phase at which it is performed and the type of connection and entity involved.
The 7~177tir7!: function. which sets the routing tables in each ATM XC. is always performed during the network
26 computer communications volume 18 number 1 january 1995
I ATM VPN design alternatives: P Crocetti et al.
set-up phase. In the INP and FRM strategies. this function is required for both VP and VC.
The htrrd~~~irlth rrlloctrtim function, which assigns
bandwidth to the ATM VPN on a long-term basis, is
again implemented in the network set-up phase and
affects only the VP. The approach to cmtcntion resohtion in the access to
AVPN resources strongly characterizes the alternatives.
In the case of EEVP. the problem is solved in a
prcvcntive way by the ATM network manager (ATM NM) during the network-set-up phase. In the INP
strategy. the public network is not involved. The CCM handles the contention. On the other hand. in the FRM scheme, the LCM interacts directly with the ATM nodes,
which check the bandwidth availability hop by hop. The p/ich,q pwauwtcv tr.s.sig~~nwnt function sets the
parameters used in the AVPN trafficcontrol. In the EEVP
these parameters simply correspond to the peak bandwidth selected for the VPs. In the INP the policing
parameters limit the peak bandwidth of the I-VP (that is. a bundle of VCs) and must be determined according to
routing and bandwidth allocation functions. In the FRM. the policing parameters limit the VC peak bandwidth and
are updated at each connection set-up and release. The policit~g function enforces the policing para-
meters selected by the previous function. The policer operates on VP. lntranode Virtual Path or VC as specified by each scheme.
The implementation of the bandwidth allocation
schemes involves several network elements: LCM and
CCM, in the private environment: and the ATM
Network manager and ATM XC in the public environ- ment. However. the complexity of the functions
performed by each element varies depending on the strategy used. The EEVP does not require any extra functions from the public network. In fact. the LCM achieves multiplexing only in the single VP connecting two end-to-end users.
In contrast. the involvement of the ATM XC to perform I-VP policing. as requested by the INP
strategy, allows a higher degree of multiplexing. In addition, this policy needs the support of a CCM to regulate access to the AVPN, resulting in an additional overhead in the private domain. which thus largely becomes the responsible AVPN management.
Unconstrained statistical multiplexing in the VPs is obtained in the FRM strategy. at the cost of a higher
involvement from the public network. This includes the introduction of new hardware and software units in the ATM XC to support FRM. In this strntegy, AVPN
access control is regulated by the public network. Note that the last two strategies require an ATM
signalling procedure. In fact. the LCM must be able to
generate control messages to either CCM or ATM XC. From the above considerations. it follows that the
architecture of an ATM XC must have ;I large degree
of flexibility to be able to support the emerging AVPN strategies”-7. The flexibility mainly relates to three
design aspects:
l the overall system architecture. which should be open. for instance, to FRM unit introduction through the use of modular criteria
a the ATM layer functionalities. which should include the options to cross-connect either on a VP or on ;I
VPjVC basis, and should allow ;tlternative strate- gies for traffic control
0 cross-connecting capabilities. which should be intrinsically robust against intro-node traffic
changes.
PERFORMANCE CONSIDERATIONS
To further compare the three strategies. let us first define
the performance criteria. Throughput, as usual. is the main concern. The throughput evaluation. of course. is
influenced by several parameters, such as traffic pattern
characteristics. Another important measure is response time for connectionless traffic. A slow response implies
that bursts must be buffered at the source gateway. It buffering is inadequate, they may be dropped. The impact on implementution is also critical. One must verify feasibility and estimate the ‘cost’ of thcsc imple-
mentations. Another desirable property is the ability to phase in the private network gradually. starting from :I few point-to-point connections.
We now proceed to the comparison of OLII- three alternatives. Starting with the EEVP scheme. we note that this scheme is completely transparent to the ATM network. Furthermore, it permits ;I gmdunl expansion of the private network. even from ;I sin& point-to- point link. with no need for special procedures. Finally, it poses no restrictions on user bandwidth allocation on
computer communications volume 18 number 1 january 1995 27
ATM VPN design alternatives: P Crocetti et al.
end-to-end VPs. However, EEVP cannot handle drastic changes in traffic pattern, and does not allow the statistical multiplexing of streams between different source/destination pairs.
Moving now to the AVPN schemes, we examine the
FRM. On the positive side, we note that FRM can easily accommodate changes in traffic pattern, and it
permits dynamic sharing of VP bandwidth among different source/destination streams. However, it incurs additional implementation costs because of the FRM procedure, which must be implemented in hardware. Furthermore, the round trip delay and ATM XC
internal procedure overhead, because of the need to
reserve bandwidth and set up the policing parameters
for each burst, should be carefully evaluated, and may cause buffer overflow at the source gateway. In an
attempt to reduce the processor and response time overheads caused by the FRM, one could transmit a
sequence of bursts in the same session using the same reservation. But then, performance may suffer, since in
FRM only peak bandwidth can be reserved. However, FRM does not allow a gradual phase-in, starting from a
single point-to-point link. All the fast reservation protocols must be in place from the beginning.
The last scheme we consider is INP. A major
advantage of INP. as compared with FRM, is ATM transparency. In fact, INP does not require the
implementation of special ATM procedures. Conse-
quently, it does not pose much of a burden on the ATM switch. It does. however, require the active
participation of CCM and LCMs in the bandwidth allocation and resource management. That is, the user incurs the cost of a CCM and of LCMs, which keep track of bandwidth usage and carry out peak or
statistical bandwidth allocation decisions. Thus, with respect to the FRM, the implementation cost has now
shifted from the ATM node to the user network management centre. A side benefit of ATM transpar-
ency is the fact that phase-in is now easy, since the
complexity is in the private equipment. From the
performance standpoint, the INP scheme can achieve very good throughput efficiency because of its ability to
statistically multiplex several user streams together. However, one potential bottleneck in INP, which does not exist in FRM, is the fragmentation of I-VP
bandwidth. Namely, if the number of VPs to a single node is large, then many I-VPs must be maintained within the node. These I-VPs limit the user’s ability to take full advantage of the bandwidth available.
Obviously, the INP scheme does not work well in this
case. In the next section, we compare throughput performance of the various alternatives in a simple numerical example.
NUMERICAL EXAMPLES
A quantitative comparison of the bandwidth allocation strategies was carried out for three representative virtual topologies: ring, star and mesh (see Figure 3). The ring
b
c
Figure 3 Three virtual topologies used for performance comparison of FRM, INP and EEVP schemes. (a) Ring topology; (b) star topology; (c) circuits in the second NSFnet backbone 1989-90
and star topologies were chosen because they are easy to
analyse due to symmetry, and thus allow straightfor- ward evaluation of performance sensitivity to several
parameters (e.g. network size). Furthermore, ring and star turn out to be the best and worst cases, respectively,
for the INP scheme. The mesh topology example (inspired by a recent NSFnet backbone’) was chosen as a realistic example of an actual AVPN topology
embedded in a wide area ATM. The mesh is expected to exhibit performance somewhere between that of the ring and star topologies.
Traffic requirements were assumed to be uniform
between all node pairs. More specifically, each node
pair has a session with peak bandwidth Bp, burstiness h and mean burst length L. Burst length and interarrival
time were assumed to be exponentially distributed, with the mean burst length L equal to 100 cells. Quality of
Service (QoS) was defined as the burst loss probability P,,, which for our purposes is more meaningful than the conventional cell loss rate. In our examples, we defined QoS, the burst loss probability P,,, to be less than or equal to 10p4. The performance measure used to
compare the various schemes is the VP bandwidth required on each AVPN link (for the star and ring topologies), or the aggregate bandwidth of all the VPs over the entire network (for the mesh topology).
Figure 4 illustrates the VP layout in a node of the ring topology for the EEVP, INP and FRM strategies. Similar layouts exist in the nodes of the star and mesh topologies. As shown in Figure 4a, a separate VP is maintained for each session on each link in the EEVP strategy. In the INP strategy (Figure 46), only one VP is established on each link. This VP carries the sum of two
28 computer communications volume 18 number 1 january 1995
Link INl’ bandwidth
Link
FRM bandwidth
User User User a b C
different streams. namely the transit stream and the
local stream. The two streams. albeit travelling on the
same VP, cannot be statistically multiplexed since they
correspond to two different I-VPs separately controlled
by the policers at the node ingress. In the FRM case
(F&W 4). there is again only one VP per link. In this
case, statistical multiplexing is possible for the entire
traffic flow within the VP.
Performance models
We have developed analytical models to compute the
bandwidth required on each link to achieve the desired
QoS (P,, < IO ‘). For simplicity, no buffering at the
user site was considered. Furthermore, buffering would
introduce delays. which may adversely affect some of
the AVPN applications. In the model. for the EEVP
case. each VP is allocated the full session peak
bandwidth. B,). since it carries only one session. In the
ring topology. assuming shortest path routing, the
number of sessions per link results as:
N \
= ((N- 1)/2f IN- I)/2 ?
while in the star topology, the number of sessions per
link is N, = N - I. where N is the number of nodes in
the system. Thus, the link bandwidth required for the
EEVP scheme = N, x B,,. For the mesh topology, the
link bandwidth for the EEVP case is also computed
analytically assuming shortest path routing. Since link
bandwidth varies from link to link, the sum of all link
bandwidths is used as a measure of performance.
In the FRM strategy, the Engset model is used to
evaluate burst loss due to blocking”. We model a link as
an M-server. pure loss system with finite customer
population equal to the number of sessions present on
the link. The probability of burst loss is thus given by:
P,, =
where x z 5. 2. = burst mean inter-arrival rate; 11
Analytical and simulation results
,H = burst mean duration; S = number of sessions; and Figwxs 5~ 7 show the performance of the three
M = number of servers (channels). bandwidth allocation schemes for the ring topology. In Substituting the value IO 4 for P,,, and the value of N, Fijywc 5, the link bandwidth required to keep the burst
for S, we get M, the number of servers (that is. the loss probability at IO 4 is plotted :!gainst the burstiness
ATM VPN design alternatives: P Crocettl et al.
number of ‘virtual’ channels. each of bandwidth B,,) per
link required to provide the desired QoS. The link
bandwidth is then given by M x B,,. where B,) is the
peak session bandwidth. The overhead due to the initial
negotiation process in the FRM scheme is accounted for
by adding an estimate of the negotiation time to the
burst mean duration. The duration of the negotiation
process was computed by assuming 2 ms constant delay
per hop. This accounts for the transmission. processing
and propagation delay of the reservation packet on each
hop along the path.
For the INP case. ;I worst cast model is used to
determine the burst loss due to temporary I-VP overload.
The customer population is again finite (i.e. number of
sessions = S). but the number of servers (that is. the
number of channels in ;i link) is assumed to be infinite.
since in INP. ;I burst atnnot be blocked or stopped at the
source when it exceeds the reserved bnndwidth. In OLII
conservative model all concurrent bursts are assumed to
be lost whenever the number of bursts exceed ;I pre-
determined threshold. This corresponds to the assump-
tion that whenever the sum of the rates of the incoming
bursts exceeds the rate controlled by the input policer.
the policer drops cells randomly from the incoming
bursts. thus damaging them all. A more sophisticated
policer could selectively drop ceils from only ;I few
bursts. thus improving performance. Unlike the FRM
case (where only peak bandwidth :tllocation is
performed), the CCM in INP c:in use either peak or
statistical multiplexing criteria to accept,‘reject sessions.
In our model, we use the statistical approach. The burst
loss probability in the INP scheme is given as follows”:
where:
S
0 xi,
/J/s = ___ ( I “- rxY
From this model. we derive the bandwidth allocation
which guarantees PI, = IO 4.
In addition to the analysis, we have also used
simulation for the FRM and INP schemes to validate
the Lmalytic results. Each simulation wils repeated
several times to compute the overall burst loss prob-
Lability within a 95% confidence interval using the /-
distribution.
computer communications volume 18 number 1 january 1995 29
ATM VPN design alternatives: P Crocetti et al.
LO”“” 1 1 performs poorly. since it does not allow statistical
IO ’ I 100 1000 10000
Figure 5 Link bandwidth I‘CI’W~ hurstiness in ring topology (B,, ~ IO Mbit,‘s, N = 50). A: FRM (simulation): : FRM
(analysis): 0: INP (simulation): -: INP (analysis): x : EEVP
10000 , ! I / I / I I
1 1 2 3 4 5 6 7 8 9 10
Session Peak Bandwidth (Mbps)
Figure 6 Link bandwidth WI’.~II.Y peak handwidth in ring topology (8 = IWO. A’ ~ 50). (For key see K~,~wc~ 5)
10 1 L I 5 10 15 20 25 30 35 40 45 50 55
Number of node4
Figure 7 Link bandwidth IW.W~ number of nodes in ring topolog (B,, = IO Mhit:s. h = 1000). (For key see Fi,~r~c .S)
of the traffic, which langes between 100 and 10000. Peak session bandwidth is assumed to be IO Mbit/s and the number of nodes in the system is 50. Since the peak
bandwidth and burst length remain constant. increasing the burstiness implies increasing the meun burst inter-
orrivnl time. As a result. the link bnndwidth required in the FRM and INP schemes decreases as the burstincss increases. Since the FRM scheme suffers the overhead of reserving the bnndwidth for 21 burst before it can be transmitted. burst loss tends to be milch higher than for INP. which does not have this overhend. However, as the burstiness incre:lses, the FRM performance
:lpproaches thut of INP. since bursts arrive less frequently and the system has enough time to reserve the bandwidth :lnd transmit the current burst before a new burst arrives. As expected. the EEVP scheme
multiplexing of bandwidth and needs peak bandwidth allocation on all VPs. irrespective of burstiness. For FRM and INP schemes. both analytic and simulation
results are reported in Figurr 5. The simulation values (obtained with 95% confidence intervals) are in good
agreement with the analytic values. thus conlirming the
validity of the analytic models. F@w 6 compares the three bandwidth allocation
schemes as the peak session bandwidth is increased
from I IO Mbit/s. Increasing the session peak
bandwidth decreases the mean burst duration. The behaviour of the FRM and INP schemes is similar to
that observed in Figure 5. When the session peak
bandwidth is low, the burst duration is large enough to mask the FRM negotiation process. allowing it to
perform well compared to the INP scheme. For high peak rates, INP outperforms FRM.
Figw~~ 7 shows the required link bandwidth IYXSII.S the
number of nodes in the system, assuming the session peak bandwidth to be IO Mbit/s and burstiness to be
1000. As the number of nodes increases. the traffic on
each VP increases. Increase in traffic due to the increase
in the number of nodes causes the same problem in the
FRM scheme as that noted in Fig~ws S and 6. Thus, for the chosen set of parameters. FRM tends to perform
better than INP for :I small number of nodes, and worst than INP for a large number of nodes.
Figwx~.r (Y-10 show the performance of the FRM. INP
and EEVP schemes on a star topology. As expected. the INP scheme performs the same as the EEVP scheme due to the fragmentation at the centre of the star. The FRM scheme performs better than the other two schemes, und its behaviour in the star topology is similar to th:lt
exhibited in the ring topology.
The results obtained with ring and s&r topologies support the notion that the INP scheme is very sensitive
to node connectivity. ;md in particular. performs very poorly when model connectivity is high (such as in the
star topology). because of I-VP fragment:ltion. The question is how will INP perform in a ‘typical’ AVPN topology. The experiments based on the NSFnet-like mesh topology shed some light on this issue. In Figwc~.v
11 and I.?. we note that the simulation results for FRM and INP ilre very close to each other. :lnd are very similar
‘“““” [
Figure 8 Link bandwidth WI’.W\ hurstiness in star topology (B,, : IO Mhil c. R: ~ 50). A: FRM (simulation): : FRM (annly4s): 0: INP: x : FEVP
30 computer communications volume 18 number 1 january 1995
ATM VPN design alternatives: P Crocetti et al.
1 ’ I
1 2 3 Se.& 5 Peak
Bandw6idtb 7 8 9 10 (Mbps)
Figure 9 Link bandwidth I~U.I‘U.S peak bandwidth in star topology (h = 1000. iii = 50). (For key see Figure 8)
10 ’ L I
5 10 15 20 25 30 35 40 45 50 55
Number of nodes
Figure IO Link bandwidth versus number of nodes in star topology (B,, = 10 Mbit/s, h = 1000). (For key see Figure 8)
to the ring topology results for N = 13. So, we conclude
that in AVPN topologies with typical (low) connectivity, the performance of the INP scheme is not affected too
drastically by bandwidth fragmentation. It is compar- able to the performance of the FRM scheme, and is by
far superior to the performance of the EEVP scheme.
CONCLUSION
An important conclusion that can be drawn from the results in this paper is the superior performance of both FRM and INP over EEVP. The larger the VP net, the
greater their advantage, mainly because of the fragmen- tation which affects EEVP.
Another important issue raised is the exposure of ATM XC to congestion in AVPN. We have shown that
the ATM XC congestion avoidance problem is directly coupled to the user bandwidth allocation strategy
within the AVPN, and we have proposed two different solutions for bandwidth allocation and congestion
control, namely, FRM and INP. The performance comparison of the two schemes
shows some definite trade-offs, which in an implementa- tion phase must be assessed against application require- ments. FRM relies very heavily on the ATM XC for AVPN bandwidth control, while INP almost completely shifts this control to the user. Performance figures also depend upon burst length, burstiness coefficient. the number of nodes and the AVPN topology.
Ill L I
‘100 1000 10000
Burstmess
Figure 11 Link bandwidth versus burstiness in NSF-like topology (B,, = IO Mbit/s. N = 13). A: FRM (simulation): 0: INP (simula- tion); x : EEVP
, 10 1
I 2 3 Sesion 5 Peak
Bandwidth 7 8 9 IO (Mbps)
Figure 12 Link bandwidth versus peak bandwidth in NSF-like topology (h = 1000. N = 13). (For key see F&tre I I)
The main contribution of this paper has been to identify the key issues affecting the design of AVPNs,
and to propose some preliminary solutions. More research is required before actual implementation.
Moreover, one must recognize that AVPNs cannot be designed and offered to customers without the avail-
ability of standards which support their actual imple- mentation.
REFERENCES
Walters, S M and Ahmed, M ‘Broadband virtual private networks and their evolution’, XIV ISS Prw.. Yokohama, Japan (October 1992) Bellcore SR-N WT-002076: Report on lhe Broudhund ISDN Protcmls for Providing SMDS and l%chun,qe Awe.~s SMDS,
Issue I (September 1991) ETSI ETR CBDS over ATM Chester Version, ETSI. France (May 1993) Gallassi, G PI al. ‘BVPN: characteristics and implementation solutions’. 2nd ht. IFIP Cmf: on Broudbund Cornrnur~.. Paris. France (March 1994) Tranchier, D P, Boyer, P E, Rouaud, Y M and Mazeas, J Y ‘Fast bandwidth allocation in ATM networks’, XII’ ISS Proc.,
Yokohama, Japan (October 1992) Canato. L, Gallassi, G, Morganti. M and Serio, F ‘Implementa- tion of ATM technology. Enc~vc~lopdiu of T~~l~c,or,?munic,cIriorrs, Vol 4 Balboni, G, Bellman, A, Collivignarelli. M. Daniele. A. Gandini. M, Licciardi, L and Verri. L ‘Key issues in designing a flexible ATM switch’, XIV ISS Proc.. Yokohama. Japan (October 1992) Comer. D Inlwwwrking with TCP,!IP. C’ol I, Prentice Hall, Englewood Cliffs, NJ (I 991) Kleinrock. L Quewing S~‘strnw. Vhmc 1. Wiley, New York (1975)
computer communications volume 18 number 1 january 1995 31