skip to main content
10.1145/1375457.1375465acmconferencesArticle/Chapter ViewAbstractPublication PagesmetricsConference Proceedingsconference-collections
research-article

Scalable VPN routing via relaying

Published:02 June 2008Publication History

ABSTRACT

Enterprise customers are increasingly adopting MPLS (Multiprotocol Label Switching) VPN (Virtual Private Network) service that offers direct any-to-any reachability among the customer sites via a provider network. Unfortunately this direct reachability model makes the service provider's routing tables grow very large as the number of VPNs and the number of routes per customer increase. As a result, router memory in the provider's network has become a key bottleneck in provisioning new customers. This paper proposes Relaying, a scalable VPN routing architecture that the provider can implement simply by modifying the configuration of routers in the provider network, without requiring changes to the router hardware and software. Relaying substantially reduces the memory footprint of VPNs by choosing a small number of hub routers in each VPN that maintain full reachability information, and by allowing non-hub routers to reach other routers through a hub. Deploying Relaying in practice, however, poses a challenging optimization problem that involves minimizing router memory usage by having as few hubs as possible, while limiting the additional latency due to indirect delivery via a hub. We first investigate the fundamental tension between the two objectives and then develop algorithms to solve the optimization problem by leveraging some unique properties of VPNs, such as sparsity of traffic matrices and spatial locality of customer sites. Extensive evaluations using real traffic matrices, routing configurations, and VPN topologies demonstrate that Relaying is very promising and can reduce routing-table usage by up to 90%, while increasing the additional distances traversed by traffic by only a few hundred miles, and the backbone bandwidth usage by less than 10%.

References

  1. T. Bates, R. Chandra, D. Katz, and Y. Rekhter. Multiprotocol Extensions for BGP-4. RFC 2283, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Caesar, T. Condie, J. Kannan, K. Lakshminarayanan, and I. Stoica. ROFL: Routing on Flat Labels. In Proc. ACM SIGCOMM, September 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Cisco. Cisco line cards, engine 0,1,2,3,4. http://www.cisco.com/en/US/products/hw/routers/ps167/products_tech_note09186a00801e1dbe.shtml.Google ScholarGoogle Scholar
  4. B. Claise. Cisco Systems NetFlow Services Export Version 9. Request for Comments 3954, October 2004.Google ScholarGoogle Scholar
  5. W. Enck, P. McDaniel, S. Sen, et al. Configuration Management at a Massive Scale: System Design and Experience. In Proc. USENIX Annual Technical Conference, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Farinacci, V. Fuller, D. Oran, and D. Meyer. Locator/ID Separation Protocol (LISP). Internet-Draft (work in progress), November 2007.Google ScholarGoogle Scholar
  7. B. Ford. Unmanaged Internet Protocol: taming the edge network management crisis. In ACM Computer Communication Review, volume 34, pages 93--98, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. IDC. U.S. IP VPN services 2006-2010 forecast. http://www.idc.com/getdoc.jsp?containerId=201682.Google ScholarGoogle Scholar
  9. R. Karp. Reducibility among combinatorial problems. In Complexity of Computer Computations, pages 85--103, 1972.Google ScholarGoogle ScholarCross RefCross Ref
  10. C. Kim, A. Gerber, C. Lund, D. Pei, and S. Sen. Scalable VPN Routing via Relaying. Technical Report, November 2007. AT&T TD-794M29.Google ScholarGoogle Scholar
  11. S. Raghunath, S. Kalyanaraman, and K. K. Ramakrishnan. Trade-offs in Resource Management for Virtual Private Networks. In Proc. IEEE INFOCOM, March 2005.Google ScholarGoogle ScholarCross RefCross Ref
  12. S. Raghunath, K. K. Ramakrishnan, S. Kalyanaraman, and C. Chase. Measurement Based Characterization and Provisioning of IP VPNs. In Proc. Internet Measurement Conference, October 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Y. Rekhter, T. Li, and S. Hares. A Border Gateway Protocol (BGP-4). RFC 4271, January 2006.Google ScholarGoogle Scholar
  14. E. Rosen and Y. Rekhter. BGP/MPLS IP Virtual Private Networks. RFC 4364, February 2006.Google ScholarGoogle Scholar
  15. X. Zhang, P. Francis, J. Wang, and K. Yoshida. Scaling IP Routing with the Core Router-Integrated Overlay. In Proc. International Conference on Network Protocols, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Scalable VPN routing via relaying

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SIGMETRICS '08: Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
        June 2008
        486 pages
        ISBN:9781605580050
        DOI:10.1145/1375457
        • cover image ACM SIGMETRICS Performance Evaluation Review
          ACM SIGMETRICS Performance Evaluation Review  Volume 36, Issue 1
          SIGMETRICS '08
          June 2008
          469 pages
          ISSN:0163-5999
          DOI:10.1145/1384529
          Issue’s Table of Contents

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 2 June 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate459of2,691submissions,17%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader