COMPARATIVE ANALYSIS OF DYNAMIC VIRTUAL PRIVATE NETWORKS RESOURCE ALLOCATION SCHEMES


For more Electronic Engineering Project click here




TABLE OF CONTENTS

APPROVAL PAGE
CERTIFICATION
DECLARATION
DEDICATION
ABSTRACT
TABLE OF CONTENTS
LIST OF FIGURES
LIST OF TABLES

CHAPTER 1:  INTRODUCTION
BACKGROUND OF STUDY
PROBLEM STATEMENT
OBJECTIVE
SCOPE
SIGNIFICANCE OF STUDY
METHODOLOGY
WORK OUTLINE

CHAPTER 2:  LITERATURE REVIEW
2.1       MULTI-PROTOCOL LABEL SWITCHING (MPLS)
2.2       THE MPLS SYSTEM
2.2.1    FORWARDING EQUIVALENCY CLASS
2.2.2    MPLS LABELS
2.3       THE MPLS ARCHITECTURE
2.3.1    DATA PLANE
2.3.2    PUSH OPERATION:
2.3.3    SWAP OPERATION:
2.3.4    POP OPERATION:
2.4       CONTROL PLANE
2.4.1    LABEL INFORMATION BASE
2.4.2    LABEL FORWARDING INFORMATION BASE (LFIB)
2.5       MPLS VPN
2.5.1    MPLS VPN DEVICES
2.5.2    VPN ROUTING AND FORWARDING
2.5.3    ROUTE PROPAGATION IN MPLS VPN
2.6       MPLS QOS
2.6.1    TRAFFIC ENGINEERING IN MPLS NETWORK
2.7       VPN QOS REQUIREMENTS
2.8       MPLS VPN SUPPORT OF QOS
2.8.1    PIPE MODEL
2.8.2    HOSE MODEL
2.9       VPN QOS PHB
2.10     RELATED WORKS IN VPN QOS PROVISIONING
2.11     SUMMARY

CHAPTER 3: MODELLING
3.1       ROBUST DYNAMICAL VIRTUAL NETWORK PROVISIONING (RDVNP)
3.2       DYNAMIC BANDWIDTH ALLOCATION AND GUARANTEE ON RESOURCE FAIRNESS (DWARF-NET)
3.3       NETWORK ARCHITECTURE
3.4       PHYSICAL MODEL
3.5       SIMULATION VALIDATION

CHAPTER 4: SIMULATION
4.1       MATLAB SIMULATION
4.2       RESULT

CHAPTER 5: CONCLUSION
5.1       RECOMMENDATIONS
5.2       CONTRIBUTIONS
5.3       FURTHER WORK
REFERENCES





ABSTRACT

The need for high performance resource allocation schemes for Virtual Private Networks (VPNs) has led to the proliferation of algorithms for VPN resource allocation. It was found that most works on VPN resource allocation focused either on admission control or link reservation on the network. Also, review of relevant literatures have revealed the need for a resource allocation/scheduling scheme whose algorithm will be able to allocate bandwidth and memory resources to different VPNS sharing the same link to the network service provider. Resources should be allocated in such a manner that utilization is optimal while VPN endpoints or customers receive services that does not undermine the service-level agreement (SLA) with the service provider. MATLAB Simulink was used to design a simulation model for analysing the VPN access network obtaining and comparing results for the link bandwidth utilization, buffer memory utilization and packet loss rate performances of the RDVNP (Robust Dynamic Virtual Network Provisioning) algorithm against the DWARF-Net (Dynamic bandWidth Allocation and guarantee on Resource Fairness) algorithm. From the results obtained, DWARF-Net algorithm’s performance was better than the RDVNP’s algorithm in almost all parameters tested on. On bandwidth utilization, DWARF-Net had an average channel utilization of 61.23% against RDVNP’s 48.28%. on buffer utilization 42% for DWARF-Net, 41% for RDVNP and average loss rate average of 1 Packet/second for DWARF-Net against 20 Packets/second for RDVNP. From the simulation analysis and result of this work, DWARF-Net was recommended to researchers as an optimal performing algorithm for VPN resource allocation.





CHAPTER ONE

INTRODUCTION
 BACKGROUND OF STUDY


For long, traditional Private Networks (PNs) were established by connecting Private Network sites (e.g., campuses or branch offices of enterprises) with leased lines over a Wide Area Network (WAN). Since these lines were dedicated lines, Security and bandwidth guarantees were assured[1]. As enterprises and other customer’s network sites proliferated and spread globally, the number of endpoints of PN’s sites has spread while the endpoints got more geographically dispersed. The distance between endpoints in a Private Network is directly proportional to the fee or cost of providing the links in the private network. Thus, connecting a large number of dispersed PN sites with dedicated lines became very expensive. As a result, there was a need for a cheaper readily available alternative to the PNs. The remedy was provided by developing the Virtual Private Network (VPN) services which ran over the public network’s backbone or over the public Internet. This method has been quite successful in making VPNs ubiquitous in interconnecting Private network sites.

A Virtual Private Network is described as “a way to simulate a Private Network over a Public network, such as the Internet” [2]. It is called "Virtual" because it depends on the use of virtual connections; that is, temporary connections that have no real physical presence, but consist of packets routed over various machines on the Internet on an ad hoc basis. Secure virtual connections can be created between two machines, a machine and a network, or two networks....

For more Electronic Engineering Project click here


____________________________________________________________________________
This is a Postgraduate Thesis and the complete research material plus questionnaire and references can be obtained at an affordable price of N3,000 within Nigeria or its equivalent in other currencies.


INSTRUCTION ON HOW TO GET THE COMPLETE PROJECT MATERIAL

Kindly pay/transfer a total sum of N3,000 into any of our Bank Accounts listed below:
·         Diamond Bank Account:
A/C Name:      Haastrup Francis
A/C No.:         0096144450

·         GTBank Account:
A/C Name:      Haastrup Francis
A/C No.:         0029938679
After payment, send your desired Project Topic, Depositor’s Name, and your Active E-Mail Address to which the material would be sent for downloading (you can request for a downloading link if you don’t have an active email address) to +2348074521866 or +2348066484965. You can as well give us a direct phone call if you wish to. Projects materials are sent in Microsoft format to your mail within 30 Minutes once payment is confirmed.
--------------------------------------------------------
N/B:    By ordering for our material means you have read and accepted our Terms and Conditions


Terms of Use: This is an academic paper. Students should NOT copy our materials word to word, as we DO NOT encourage Plagiarism. Only use as guide in developing your original research work.

Delivery Assurance
We are trustworthy and can never SCAM you. Our success story is based on the love and fear for God plus constant referrals from our clients who have benefited from our site. We deliver project materials to your Email address within 15-30 Minutes depending on how fast your payment is acknowledged by us.

Quality Assurance

All research projects, Research Term Papers and Essays on this site are well researched, supervised and approved by lecturers who are intellectuals in their various fields of study.
Share:

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Search for your topic here

See full list of Project Topics under your Department Here!

Featured Post

Article: How to Write a Research Proposal

Most students and beginning researchers do not fully understand what a research proposal means, nor do they understand ...

Popular Posts