David Tipper Graduate Telecommunications and Networking Program. Telcom 2110 Network Design, Slides 11. WAN Network Design



Similar documents
Introducing Basic MPLS Concepts

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

MPLS Concepts. Overview. Objectives

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

Lesson 13: MPLS Networks

MPLS - A Choice of Signaling Protocol

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

Master Course Computer Networks IN2097

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

Bandwidth Management in MPLS Networks

How To Provide Qos Based Routing In The Internet

Multi Protocol Label Switching (MPLS) is a core networking technology that

Fundamentals of MPLS for Broadcast Applications

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr Cisco Systems, Inc. All rights reserved.

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

Path Selection Analysis in MPLS Network Based on QoS

Quality of Service for VoIP

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

MPLS and IPSec A Misunderstood Relationship

MPLS Multiprotocol Label Switching

New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

How To Understand The Benefits Of An Mpls Network

MPLS Traffic Engineering - A Choice Of Signaling Protocols

Internetworking II: VPNs, MPLS, and Traffic Engineering

MPLS is the enabling technology for the New Broadband (IP) Public Network

MPLS in Private Networks Is It a Good Idea?

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

RFC 2547bis: BGP/MPLS VPN Fundamentals

Performance Evaluation for VOIP over IP and MPLS

Project Report on Traffic Engineering and QoS with MPLS and its applications

Design of MPLS networks VPN and TE with testing its resiliency and reliability

MPLS Based Recovery Mechanisms

Migrating to MPLS Technology and Applications

Testing Edge Services: VPLS over MPLS

APNIC elearning: Introduction to MPLS

QoS Strategy in DiffServ aware MPLS environment

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

MPLS L2VPN (VLL) Technology White Paper

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

Cisco Configuring Basic MPLS Using OSPF

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport

Experiences with Class of Service (CoS) Translations in IP/MPLS Networks

Department of Communications and Networking. S /3133 Networking Technology, Laboratory course A/B

Introduction to MPLS-based VPNs

Building MPLS VPNs with QoS Routing Capability i

100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

Virtual Leased Lines - Martini

November Defining the Value of MPLS VPNs

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Comparative Analysis of Mpls and Non -Mpls Network

How Routers Forward Packets

Multiprotocol Label Switching (MPLS)

MPLS Virtual Private Networks

Protection Methods in Traffic Engineering MPLS Networks

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

RSVP- A Fault Tolerant Mechanism in MPLS Networks

MPLS Part II - Recovery

SBSCET, Firozpur (Punjab), India

Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond

L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet.

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

MPLS Implementation MPLS VPN

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking

Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing

Multiple Layer Traffic Engineering in NTT Network Service

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

Implementing Multiprotocol Label Switching with Altera PLDs

Figure 1: Network Topology

Boosting Capacity Utilization in MPLS Networks using Load-Sharing MPLS JAPAN Sanjay Khanna Foundry Networks

Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt)

Enterprise Network Simulation Using MPLS- BGP

MPLS VPNs with DiffServ A QoS Performance study

Traffic Engineering & Network Planning Tool for MPLS Networks

H3C SR8800 RPR Technology White Paper

IP Core Transport Network

1.1. Abstract VPN Overview

Definition. A Historical Example

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Testing VoIP on MPLS Networks

EVALUATING NETWORKING TECHNOLOGIES

Dynamic Network Resources Allocation in Grids through a Grid Network Resource Broker

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

1.264 Lecture 37. Telecom: Enterprise networks, VPN

MPLS Traffic Engineering in ISP Network

DD2491 p MPLS/BGP VPNs. Olof Hagsand KTH CSC

IP Switching: Issues and Alternatives

Innovation in Access and Metropolitan Area Networks -

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

Transcription:

WAN - VPN Network Design David Tipper Graduate Telecommunications and Networking Program University it of Pittsburgh Telcom 2110 Network Design, Slides 11 WAN Network Design WAN typically have a mesh or ring design Mesh topologies introduce the problem of routing traffic Many algorithms/optimization formulations/design tools for WAN packet network design Tend to be imbedded in network topology /data rate layer Different design techniques and metrics at different layers IP MPLS VPN design WDM circuit switched routing and wave length assignment In general techniques are either Graph theory based Optimization based Heuristics Considered Routing heuristics for IP layer design Consider Optimization techniques for VPN design TELCOM 2110 2 1

Optimization Based Design Good Reference is M. Pioro and D. Medhi, Routing, Flow and Capacity Design in Communication and Computer Networks, Morgan Kauffman 2004 Maximize (or minimize): f x 1, x 2 x n Subject to: g1 x1, x2 xn,, b1 g x, x x,, b 2 1 2 n 2,,, g x x x b m 1 2 n m Objective Constraints where x x, 1 2 x n are the decision variables Formulations usually either Linear Programming problems (objective and constraints linear) Integer Programming problems (linear objective and constraints but integer design variables) Mixed Integer Programming problems Nonlinear MIPs, etc. TELCOM 2110 3 Optimization Based Network Design Node Locations Potential Links Traffic Demands Cost function/parameters Input Data Network Design Optimizer Find working path for traffic demands Find backup paths for given failure scenarios Survivability requirements Network design strategy/ Network optimization model Network topology & Link capacity assignment Technology, QoS requirements, etc Output Results Network Cost Network Topology Capacity of Links Working Paths Backup Paths TELCOM 2110 4 2

WAN Network Design Many optimization formulations and design tools for WAN network design Optimization Techniques usually form the initial basis of the formulation Often use a heuristic or meta-heuristic solution technique Formulation depends Network layer (e.g., WDM, SONET, MPLS, etc.), Technology, QoS requirements Reliability goals Other constraints Consider MPLS VPN design as an example TELCOM 2110 5 Virtual Networks Virtual Network refers to A class of service that uses a shared network infrastructure to emulate the characteristics of a private network. The virtual network should for all intensive purposes appear to the users as a fully functional physical network (`` network within a network ). Typically have many Virtual Networks over a common shared network infrastructure VPN Node Crossconnect Node Virtual Trunk Overlay VPN #3 Normally separate traffic among virtual networks - termed Virtual Private Networks (VPNs) Overlay VPN #2 Each VPN can have different service levels (i.e., bandwidth, availability, packet loss, etc.) Overlay VPN #1 Service Provider Network TELCOM 2110 6 3

Why Virtual Networks? Cost Virtual Networks For example, in WANs cheaper to lease virtual bandwidth connectivity then string fiber Service Providers can support many virtual networks simultaneously Workforce optimization Security/Legal/Regulatory Compliance provides separation of traffic can quarantine non compliant hosts Manageability VN network manager can concentrate on managing their infrastructure links through service provider managed in part or in total by service provider Consolidation of multiple networks onto a single infrastructure Flexability Service Providers can provide different service levels (QoS. Security, availability) to VNs - can rearrange logical VN links to support demand changes, etc. In LAN user can move offices and not change VLAN TELCOM 2110 7 Virtual Networks Virtual Network Technology Virtual Networks can be implemented at several network layers in different technologies Some technology options WAN Circuit Switched Logical Virtual Trunks Frame Relay ATM Virtual Paths MPLS - LSPs WDM lightpath based VNs MANs Sonet, Frame Relay, WiMAX LANs Ethernet, 802.11 Overlay Applications (MBONE, VNET, etc.) Tunneling Protocols (GRE, IPSEC, PPTP, etc.) Consider one type of WAN of VN technology Multi Protocol Label Switching (MPLS) TELCOM 2110 8 4

IP QoS in WANs Trend to Use Differserv on Edge MPLS in Backbone Most Providers have significant MPLS networks in Core CE: Customer Equipment, PE: Provider Equipment In core use MPLS Diffserv treatment on packets leaving CE PE Provider Core PE CE CE Diffserv treatment on packets leaving PE TELCOM 2110 9 MPLS Background Multi-Protocol Label Switching (MPLS) is used over IP infrastructure to deliver QoS performance to different service classes, provide security and VPNs. MPLS use a label-swapping forwarding technique. Labels are assigned when the packet enters into the network. MPLS routers forward packets based on the label value. Fields: Label, Class of Service, Stack bit, Time-to-Live 0 20 32 Label CoS S TTL IP header, Ethernet header, etc. MPLS header TELCOM 2110 10 5

Forward Equivalent Class Packets entering MPLS domain will be classified into different Forward Equivalent Class (FEC) by a edge router called a label switching router (LSR) A Forwarding Equivalence Class (FEC): A subset of packets that are all treated the same way by an LSR basically separating traffic A packet s FEC can be determined by one or more of the following: Source and/or destination IP address Source and/or destination port number Destination-based (unicast) routing Multicast routing Traffic engineering VPNs QoS Security, etc Different levels of traffic aggregation are possible. Aggregate traffic based on its IP destination pre-fixed. Aggregate traffic based on its egress node. etc.. TELCOM 2110 11 MPLS Network Packet Classification TELCOM 2110 12 6

MPLS Operation At ingress LSR of an MPLS domain, an MPLS header is inserted to a packet before the packet is forwarded Label in the MPLS header encodes the packet s FEC At subsequent LSRs The label is used as an index into a forwarding table that specifies the next hop and possibly a new label. If the label is to be replaced the field is overwritten with the new label, and the packet is forwarded to the next hop. Egress LSR strips the label and forwards the packet to final destination based on the IP packet header Note a MPLS router forwards packets to outgoing interface based only on label value (don t inspect IP address) MPLS forwarding table distinct from IP forwarding tables Provide speed up in the network core TELCOM 2110 13 Label Switched Path A label-switched path (LSP) is a path through which packets of a particular FEC will be forwarded. Two types of LSPs 1. Prefixed-based LSPs created based on route advertisement Controlled by routing or signaling Traditional IP-OSPF routing ( No QoS or CoS support ) 2. Tunnel based LSPs created between specific MPLS end-points Controlled by signaling (RSVP-TE, CR-LDP) Used for traffic engineering, QoS provision, VPN service, etc.. LSPs are always unidirectional TELCOM 2110 14 7

MPLS Packet Forwarding In In Port Lab Address Prefix Out Out Port Lab 4 X 171.68.10 3 5 In In Port Lab Address Prefix Out Out Port Lab 0 5 171.68.10 1 3 MPLS Network 171.68.10 / 24 IP packet 171.68.10.12 LSR - A LSR - B LSR - C Label=5 Label=3 IP packet IP packet 171.68.10.12 171.68.10.12 TELCOM 2110 15 MPLS Operation Can keep LABEL end-to-end create a tunnel through the network Intf : Interface or Port Intf Label Intf Label In In Out Out 3 50 1 50 Intf Label Intf In In Out 3 50 1 FEC Intf Out Label Out a 1 50 3 1 2 50 3 2 1 50 3 2 1 TELCOM 2110 16 8

Label Assignment and Distribution Labels have local significance Labels are assigned and exchanged between adjacent LSRs from downstream to upstream direction. - Unsolicited downstream LSRs assign a label to each FEC and distribute labels to all its upstream neighbors. - Downstream on demand For each FEC, upstream LSR request label binding to its downstream LSRs. In MPLS, A forwarding path can be a sink-tree path or a multipoint-to-point (MP2P) path ending at an egress node. TELCOM 2110 17 Downstream on Demand Label Assignment Use label 5 for Destination 171.68.10 / 24 Use label 3 for Destination 171.68.10 / 24 171.68.40 / 24 171.68.10 / 24 LSR - A LSR - B LSR - C Request label for Destination 171.68.10 / 24 Request label for Destination 171.68.10 / 24 18 TELCOM 2110 18 9

VPN over MPLS backbone MPLS is used over a transport backbone network to deliver QoS performance to different classes of service (CoS). Using explicit path setup in MPLS, a QoS-based VPN can be efficiently built over the infrastructure. Different FECs may be used to classify traffic from different VPNs which may or may not use the same forwarding path. share some portion of network bandwidth. VPN point-to-point traffic can be implemented as Full mesh of LSPs (N x N-1) LSPs Multi-point to point sink tree LSPs N LSPs TELCOM 2110 19 Logical Network Topology Provider Edge (PE) Router Provider Core Router C Overlay VPN Network A B Service Provider IP/MPLS Network TELCOM 2110 20 10

Point-to-Point LSPs Provider Edge (PE) Router Provider Core Router Label Switch Path (LSP) Overlay VPN Network A B C 1 Service Provider MPLS Network 3 2 5 4 6 TELCOM 2110 21 Multipoint-to-point LSPs Provider Edge (PE) Router Provider Core Router Label Switch Path (LSP) Overlay VPN Network A B C 1 Service Provider MPLS Network 2 3 Shared-BW links TELCOM 2110 22 11

SLAs Service Level Agreements (SLAs) Legal agreement between customers and service provider for VPN service specifies cost, security, performance factors, traffic demand, domains of responsibility Performance factors can include delay, bandwidth, delay jitter, packet loss, availability, etc. Traffic demand peak bit rate, mean rate, burst length Cogent basically a Business ISP backbone VPN provider - see SLA on class web page TELCOM 2110 23 SLAs SLA will define metrics to evaluate service level For example monthly average delay across backone, monthly packet loss rate, yearly availability, etc. Should clearly define where metrics measured, how measured frequency of measurement Should define penalties for not meeting SLA (usually in $) and traffic enforcement/shaping by provider Good References TMFORUM SLA Handbook ITU-T Handbook on QoS and Network Performance Annex: SLA TELCOM 2110 24 12

Basic VPN Network Design Goals of VPN network design same as general network design just an overlay connecting a subset of network nodes or all nodes Minimize total cost Subject to Constraints for example Link capacity must exceed some min, and be less than some max Average Packet Delay must be < maximum Reliability requirements Throughput, etc. Variations Main difference is physical topology defined Multiple VPNs are usually deployed Consider MPLS case TELCOM 2110 25 VPN Design Problem Given Physical network topology Link capacity and its cost VPNs requirements (i.e., traffic demands, QoS parameters) Consider two LSP approaches Mesh based on Point to Point LSPs Mesh multi-point to point sink-tree LSPs Find the optimal LSP layouts and their dimension such that Objective : Minimize (total virtual network cost) Constraints : QoS requirements (packet-level parameters) GoS requirements (call-level parameters) Link capacity limitations TELCOM 2110 26 13

VPN Design Procedure Three main tasks 1)Path generation Candidate path generation For multi-point to point sink trees generate candidate trees reduce complexity by limiting possible tree selection 2)Virtual link dimensioning Logical link bandwidth sizing of a given demand 3)Network routing optimization Route selection for each VPN logical link TELCOM 2110 27 Path/Tree Selection Paths Would like to consider all possible paths between a source destination pair Usually much too big a set Standard approach to reduce complexity is to put a hop count limit it on the paths considered Doesn t have to be the same limit for each s- d pair (rule of thumb is shortest path + 2 hops) Trees All distinct spanning trees or shortest path trees Usually too big a set Prune from set of possible set of trees Hop-count limit (e.g., max s-d shortest path +2) Avoid long branch trees in the feasible space Select trees having fewer total number of 1 2 3 4 n Depth = 1 (i) Sink-tree with 1-hop depth n 3 Depth = n-1 links 1 promotes bandwidth sharing (ii) Sink-tree with (n-1)-hop depth TELCOM 2110 28 2 14

Link Dimensioning Must determine LSP capacity In some cases the customer is just leasing bandwidth at a fixed data rate (e.g., OC-3) as specified in SLA so dimensioning is predefined Can use Min-Delay, Min-MAX Delay capacity allocations from previous lecture - depending on QoS requirements and expected revenue from SLA Can use Effective bandwidth calculation to determine the link capacity requirement use parameters from SLA (e.g., mean rate for traffic, mean packet loss rate) and traffic shaper/enforcement at service provider EDGE router. Maps parameters into a equivalent capacity C which is dimensioned for LSP along path. TELCOM 2110 29 Link Dimensioning Many different effective bandwidth calculations in the literature Here use the classic one by Guerin, et. al., Equivalent Capacity and its Application to Bandwidth Allocation in High-Speed Networks, IEEE JSAC 1991. Traffic with source characteristic: mean rate m, standard deviation peak rate R peak, utilization, burst length b, Equivalent capacity estimation for each source ĉi cˆ where a i R peak b B a 1 1 ln a 1 2 2a 4 a Packet loss rate Buffer size in sec at peak rate TELCOM 2110 30 15

Link Dimensioning Example Consider the sink tree LSP 1 shown in the MPLS network on slide 22 At nodes B and C the offered load to node A has the characteristics R peak =1Mbps, b =300 msec, ρ =0.2,B = 1500 msec at peak rate =>.1875 Mbytes, =10-5, m =.2Mbps, p, =.24) Determine the amount of capacity that should be allocated to the LSP at the entry nodes of LSP 1 First compute a a b B 5 1 ln [300 /1500](1 0.2) ln(10 ) 1. 8421 a 1 a 1 4 a cˆ i R peak 0. 626958 2a 2 Mbps TELCOM 2110 31 Link Dimensioning (cont.) At a merged link in a multi-point to point tree on can aggregate bandwidth among branches of traffic flowing to destination For traffic connections multiplexed Allocated BW : Cˆ R peak Cˆ min m, cˆ i ln 2 ln 2 Packet loss ratio Bandwidth efficiency and reduction in number of LSP is achieved when traffic is merged into the same pipe. TELCOM 2110 32 16

Link Dimensioning Example One of the motivations for using sink trees is save bandwidth where branches of a tree merge. Determine the equivalent capacity needed for the traffic from nodes B and C to A in LSP 1 at the merger point Determining the bandwidth requirement at the merge point we have 2ln ln 2 4. 603 m, cˆ min{1.5047,1.259} 1. Mbps Cˆ min i 259 In this case the merged bandwidth is just twice the individual flows but note it is much less than twice the peak rate of 2Mbps TELCOM 2110 33 Design Optimization Model L N M Cl Set of links in the network. Set of nodes in the network. St Set of edge nodes in the network. Maximum capacity of link l L M N l l K P k Dk d Bk SPl Utilization factor of link Cost of a capacity on link Demand set index K M l L l L Set of candidate paths for demand pair k Set of point-to-point demand pairs in demand set Bandwidth requirement of demand pair d D k Maximum Limit on number of LSPs on link l k K L TELCOM 2110 34 17

Notation Decision Variables Y l p X k Sizing decision variable :: capacity assigned for VPN traffic on link Routing decision variables = 1 if path p P is used for demand set k K = 0 otherwise l L Also have from the pre-computed path set l p, d Link path incidence matrix = 1 if demand pair dd of set that uses path k k K is directed using link l L = 0 otherwise p P k TELCOM 2110 35 Mathematical Formulation Minimize Given l D k ll l Yl Total VPN capacity cost, Cl Link utilization factor, Maximum link capacity d, B k Traffic demand, Bandwidth requirement Pk l, p, d Set of precomputed sink-tree paths, Link path incidence matrix Obtain Yl p X k Link BW allocations Routing path TELCOM 2110 36 18

Mesh VPN with Point-Point Links Formulation Minimize Subject tto : ( 1 ) ppk p X k ll 1 l Yl Total VPN capacity cost Path selection criteria ; for all k K Link capacity requirement ( 2 ) d l p B k p d X, k k K d D k p Pk Y l ; for all l L Link capacity limitation ( 3 ) Yl ; for all l L l Cl d ( 4 ) k SPl p Pk d D k ; for all l L TELCOM 2110 37 Sink Tree Case Point-to-point traffic demand is considered. A traffic demand is classified/routed based on an exit node. Two cases : No bandwidth aggregation Bandwidth aggregation is possible when traffic is merged/multiplexed on a sink-tree paths. Sample notation as before except candidate path set now a set of trees rooted at destination nodes Pk, Eqv B T, QoS Set of candidate sink-trees ending at node k N Equivalent bandwidth of traffic requires capacity B with traffic descriptor T and QoS parameters TELCOM 2110 38 19

Without Bandwidth Aggregation Formulation Minimize Subject to : ( 1 ) ( 2 ) ( 3 ) pp k p X k ll 1 l Yl Path selection criteria Link capacity requirement Total VPN capacity cost d l p B T QoS,, X Yl Eqv k p, d k K ddk ppk Yl l Cl Link capacity limitation k ; for all k K ; for all l L ; for all l L SP d ( 4 ) k l ; for all l L p P d D k k TELCOM 2110 39 With Bandwidth Aggregation Minimize ll l Yl Total VPN capacity cost Subject tto : ( 1 ) ( 2 ) ( 3 ) Path selection criteria p X k 1 pp k Link capacity requirement d l p Eqv Bk p d X k T QoS k K,,, d Dk p P k Yl l Cl Link capacity limitation Yl ; for all k K ; for all l L ; for all l L ( 4 ) p Pk d D k d k SP l ; for all l L TELCOM 2110 40 20

Numerical Study The design model is a mixed Integer programming problem of NP-hard type. The problem is translated using AMPL model description language and solution is obtain using CPLEX solver. Benchmark is obtained for a small network where LP bound is easy to establish. TELCOM 2110 41 Tested Networks 8-node Network 10-node Network TELCOM 2110 42 21

Sample Results Topology Full-Mesh Design Sink-Tree(s) Design (w/o BW aggregation) Sink-Tree(s) Design (with BW aggregation) Optimal Cost Simplex Iterations No. of LSPs Optimal Cost Simplex Iterations No. of LSPs Optimal Cost Simplex Iterations No. of LSPs 8- node 104 54 56 104 241 8 56 473 8 10- node 174 65 90 174 736 10 90 1503 10 TELCOM 2110 43 Multiple VPN Design Problem Given Physical network topology Link capacity and its cost Number of VPNs and their requirements Traffic demands, QoS, etc. May have 100 or 1000s of VPNs to provision over infrastructure Find the logical layout and their dimension such that Objective : Minimize (total virtual network cost, number of LSPs) Constraints : QoS requirements (packet-level parameters) Link capacity limitations Can modify optimization models to add set of VPN to be designed - difficult to scale problem to large networks and large number of VPN TELCOM 2110 44 22

Can solve optimization model in one at a time fashion Does the order in which the VPNs are designed matter? YES By modifying optimization model to include multiple VPNs and solving optimization model for small cases can see how to rank VPNs Multiple VPN Overlays TELCOM 2110 45 Heuristic Solution Multiple VPN Design 1. Assign each VPN a weight = Sum (traffic demand x distance (i.e., shortest path) ) 2. Sort VPNs on weight in descending order (i.e., largest weight first ) and set VPN index i=1 3. Use a standard algorithm to layout VPN i (Mentor, Routing approach, optimization formulation, etc.) 4. Subtract VPN i bandwidth requirements from physical network capacity where used. 5. Increment i= i+1, repeat steps 3 and 4 until all VPNs are provisioned. Note VPNs with small weight may have non- shortest path routes/trees through the physical network. TELCOM 2110 46 23

Summary Optimization based WAN Design Virtual Network Design in WANs MPLS LSPs, Point-to-Point vs. Sink Trees Single VPN Optimal Design Formulation Point-to-Point Sink Trees Sink Trees with bandwidth aggregation Heuristic for Multiple VPN Design TELCOM 2110 47 24