Skip to main content
Log in

Multi-layer Virtual Transport Network Design

  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

Service overlay networks and network virtualization enable multiple overlay/virtual networks to run over a common physical network infrastructure. They are widely used to overcome deficiencies of the Internet (e.g., resiliency, security and QoS guarantees). However, most overlay/virtual networks are used for routing/tunneling purposes, and not for providing scoped transport flows (involving all mechanisms such as error and flow control, resource allocation, etc.), which can allow better network resource allocation and utilization. Most importantly, the design of overlay/virtual networks is mostly single-layered, and lacks dynamic scope management, which is important for application and network management. In response to these limitations, we propose a multi-layer approach to virtual transport network (VTN) design. This design is a key part of VTN-based network management, where network management is done via managing various VTNs over different scopes (i.e., ranges of operation). We explain the details of the multi-layer VTN design problem as well as our design algorithms, and focus on leveraging the VTN structure to partition the network into smaller scopes for better network performance. Our simulation and experimental results show that our multi-layer approach to VTN design can achieve better performance compared to the traditional single-layer design used for overlay/virtual networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26

Similar content being viewed by others

Notes

  1. It is referred to as the VTN formation problem in [6].

  2. In this paper, we use the terms node and host interchangeably.

  3. For \(G_{n} = \langle V, E^{n}\rangle\), where \(n\ge 0\), V is the same for all n since V is the set of all hosts. \(E^n\) represents the set of all virtual links, which grows as we build more (higher-level) VTNs.

  4. Note that level-0 can be set over any kind of link. A level-0 link can be a virtual link supported by overlay/virtual networks, and not necessarily a physical link.

  5. The path selection stage can be solved using a shortest path algorithm or by solving an Integer Linear Programming (ILP) problem to satisfy different QoS requirements as discussed in [6].

  6. We have observed similar trends for different network graphs.

References

  1. Kurian, J., Sarac, K.: A survey on the design, applications, and enhancements of application-layer overlay networks. ACM Comput. Surv. 43(1), 5:1–5:34 (2010)

    Article  Google Scholar 

  2. Galán-Jiménez, J., Gazo-Cervero, A.: Overlay networks: overview, applications and challenges. IJCSNS 10(12), 40 (2010)

    Google Scholar 

  3. Anderson, T., Peterson, L., Shenker, S., Turner, J.: Overcoming the internet impasse through virtualization. Computer 4, 34–41 (2005)

    Article  Google Scholar 

  4. Chowdhury, N.M.K., Boutaba, R.: A survey of network virtualization. Comput. Netw. 54(5), 862–876 (2010)

    Article  MATH  Google Scholar 

  5. Wang, Y., Matta, I.: SDN management layer: design requirements and future direction. In: Workshop on Control, Operation, and AppLication in SDN Protocols (CoolSDN 2014), Co-located with ICNP 2014, Raleigh, NC, USA, October (2014)

  6. Wang, Y., Matta, I.: A recursive approach to network management. In: Technical Report BUCS-TR-2015-014, Boston University (2015)

  7. Day, J.: Patterns in Network Architecture: A Return to Fundamentals. Prentice Hall, Upper Saddle River (2008)

    Google Scholar 

  8. Day, J., Matta, I., Mattar, K.: Networking is IPC: a guiding principle to a better internet. In: Proceedings of ReArch’08-Re-architecting the Internet (Co-located with CoNEXT), New York, NY, USA (2008)

  9. Wang, Y., Matta, I., Esposito, F., Day, J.: Introducing ProtoRINA: a prototype for programming recursive-networking policies. ACM SIGCOMM Comput. Commun. Rev. (CCR) 44, 129–131 (2014)

    Article  Google Scholar 

  10. US Ignite Initiative. https://www.us-ignite.org/

  11. Andersen, D., Balakrishnan, H., Kaashoek, F., Morris, R.: Resilient overlay networks. In: Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles, ser. SOSP ’01. ACM, New York, NY, USA, pp. 131–145 (2001). https://doi.org/10.1145/502034.502048

  12. Jannotti, J., Gifford, D.K., Johnson, K.L., Kaashoek, M.F., et al.: Overcast: reliable multicasting with an overlay network. In: Proceedings of the 4th Conference on Symposium on Operating System Design and Implementation, vol. 4. USENIX Association, pp. 14–14 (2000)

  13. Subramanian, L., Stoica, I., Balakrishnan, H., Katz, R.H.: OverQoS: an overlay based architecture for enhancing internet QoS. In: NSDI, vol. 4, p. 6 (2004)

  14. Keromytis, A.D., Misra, V., Rubenstein, D.: SOS: secure overlay services. In: Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ser. SIGCOMM ’02. ACM, New York, NY, USA, pp. 61–72 (2002). https://doi.org/10.1145/633025.633032

  15. GENI. http://www.geni.net/

  16. Open Stack: Neutron Project. https://wiki.openstack.org/wiki/Neutron

  17. Sherwood, R., Gibb, G., Yap, K.K., Appenzeller, G., Casado, M., McKeown, N., Parulkar, G.: FlowVisor: a network virtualization layer. In: Technical Report, OpenFlow-TR-2009-1, OpenFlow Consortium (2009)

  18. Jin, X., Gossels, J., Rexford, J., Walker, D.: CoVisor: a compositional hypervisor for software-defined networks. In: NSDI. USENIX Association, Berkeley, CA, USA (2015)

  19. Kamel, M., Scoglio, C., Easton, T.: Optimal topology design for overlay networks. NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, pp. 714–725 (2007)

  20. Li, Z., Mohapatra, P.: On investigating overlay service topologies. Comput. Netw. 51(1), 54–68 (2007)

    Article  MATH  Google Scholar 

  21. Adami, D., Callegari, C., Giordano, S., Nencioni, G., Pagano, M.: Design and performance evaluation of service overlay networks topologies. In: International Symposium on Performance Evaluation of Computer Telecommunication Systems, 2009. SPECTS 2009, vol. 41, pp. 296–303, July 2009

  22. Han, J., Watson, D., Jahanian, F.: Topology aware overlay networks. In: INFOCOM: 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, vol. 4, pp. 2554–2565. IEEE (2005)

  23. Vieira, S.L., Liebeherr, J.: Topology design for service overlay networks with bandwidth guarantees. In: Twelfth IEEE International Workshop on Quality of Service: IWQOS 2004. IEEE, pp. 211–220 (2004)

  24. Zhou, L., Sen, A.: Topology design of service overlay network with a generalized cost model. In: Global Telecommunications Conference: GLOBECOM’07. IEEE, pp. 75–80 (2007)

  25. Barla, I.B., Schupke, D., Hoffmann, M., Carle, G., et al.: Optimal design of virtual networks for resilient cloud services. In: 2013 9th International Conference on the Design of Reliable Communication Networks (DRCN). IEEE, pp. 218–225 (2013)

  26. Fan, J., Ammar, M.H.: Dynamic topology configuration in service overlay networks: a study of reconfiguration policies. In: INFOCOM (2006)

  27. ETSI: Network functions virtualisations (NFV)—white paper. https://portal.etsi.org/Portals/0/TBpages/NFV/Docs/NFV_White_Paper3.pdf

  28. Santiváñez, C.A., Ramanathan, R., Stavrakakis, I.: Making link-state routing scale for ad hoc networks. In: Proceedings of the 2Nd ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, New York, NY, USA, pp. 22–32 (2001)

  29. Ratnam, K., Matta, I.: WTCP: an efficient mechanism for improving wireless access to TCP services. Int. J. Commun. Syst. 16(1), 47–62 (2003)

    Article  MATH  Google Scholar 

  30. Balakrishnan, H., Padmanabhan, V.N., Seshan, S., Katz, R.H.: A comparison of mechanisms for improving TCP performance over wireless links. IEEE/ACM Trans. Netw. 5(6), 756–769 (1997)

    Article  Google Scholar 

  31. Sindelar, M., Sitaraman, R.K., Shenoy, P.: Sharing-aware algorithms for virtual machine colocation. In: Proceedings of the Twenty-Third Annual ACM Symposium on Parallelism in Algorithms and Architectures, ser. SPAA ’11. ACM, New York, NY, USA, pp. 367–378 (2011)

  32. VTN Simulator. http://csr.bu.edu/rina/protorina/simulator/code/

  33. Medina, A., Lakhina, A., Matta, I., Byers, J.: BRITE: an approach to universal topology generation. In: MASCOTS (2001)

  34. Wang, Y.: ProtoRINA 2.0. http://csr.bu.edu/rina/protorina/2.0 (2016)

  35. Open vSwitch. http://www.openvswitch.org/

  36. Grinstead, C.M., Snell, J.L.: Introduction to Probability. American Mathematical Society, Providence (2012)

    MATH  Google Scholar 

Download references

Acknowledgements

This work has been partly supported by National Science Foundation awards: CNS-0963974 and CNS-1346688.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuefeng Wang.

Additional information

This work was done while Yuefeng Wang was at Boston University.

Appendix: Proof of Equation 6

Appendix: Proof of Equation 6

Equation 6 can be derived using an absorbing Markov chain. As shown in Fig.27, each circle denotes a possible state of the current packet, where \(S_0\) is the initial state where a packet is to be sent by the sender, and \(S_H\) is the absorbing (final) state when the packet is received by the receiver. For any intermediate state, it has a probability of \(1-P\) of transitioning to the following state if the packet does not get lost; if the packet gets lost (with probability P), it goes back to the initial state (\(S_0\)). This absorbing Markov chain has H transient states (\(S_0\) to \(S_{H-1}\)), and 1 absorbing state (\(S_H\)), so the expected number of total transmissions for all hosts along the path to successfully deliver one packet is the same as the expected number of steps from the initial state \(S_0\) to the absorbing state \(S_H\).

Fig. 27
figure 27

An absorbing Markov chain for delivering one packet over a TCP connection of H hops, where each circle denotes a possible state. Assume loss rate on each link is P

Generally, for an absorbing Markov chain with transition matrix P, assume it has t transient states and r absorbing state, then

$$\begin{aligned} P= \begin{bmatrix} Q&R\\ 0&I_r\\ \end{bmatrix} \end{aligned}$$

where Q is a t-by-t matrix and I is the r-by-r identity matrix. The fundamental matrix of an absorbing Markov chain is \(N = ( I - Q)^{-1}\), and the expected number of step from the initial state to the absorbing states is \(t = N c\), where c is a column vector all of whose entries are 1 [36].

For the absorbing Markov chain in Fig. 27, \(t= H\) and \(r = 1\), so its transition matrix is

$$\begin{aligned} P[ (H + 1) \times (H+ 1)]= \begin{bmatrix} P&1-P&0&0&..&0&0\\ P&0&1-P&0&\ldots&0&0\\ P&0&0&1-P&\ldots&0&0 \\ \vdots&\vdots&\vdots&\vdots&\ddots&\vdots&\vdots \\ P&0&0&0&\ldots&0&1-P\\ 0&0&0&0&\ldots&0&1 \\ \end{bmatrix} \end{aligned}$$

where

$$\begin{aligned} Q[ H \times H]= \begin{bmatrix} P&1-P&0&0&..&0 \\ P&0&1-P&0&\ldots&0 \\ P&0&0&1-P&\ldots&0 \\ \vdots&\vdots&\vdots&\vdots&\ddots&\vdots \\ P&0&0&0&\ldots&1-P \\ P&0&0&0&\ldots&0 \\ \end{bmatrix} \end{aligned}$$

Then its fundamental matrix is

$$\begin{aligned} N = ( I - Q)^{-1}= \begin{bmatrix} 1-P&P-1&0&0&..&0 \\ -P&1&P-1&0&\ldots&0 \\ -P&0&1&P-1&\ldots&0 \\ \vdots&\vdots&\vdots&\vdots&\ddots&\vdots \\ -P&0&0&0&\ldots&P-1 \\ -P&0&0&0&\ldots&1 \\ \end{bmatrix}^{-1} \end{aligned}$$
$$\begin{aligned} = \begin{bmatrix} (1-P)^{-H}&(1-P)^{1-H}&\ldots&(1-P)^{-2}&(1-P)^{-1} \\ \vdots&\vdots&\ddots&\vdots&\vdots \\ \end{bmatrix} \end{aligned}$$

So the expected number of steps from \(S_0\) to \(S_H\) is \(t = N c = (1-P)^{-1} + (1-P)^{-2} + .. + (1-P)^{-H}\) = \(\displaystyle { { ({ {1}\over {1-P} }) ^H - 1 }\over {P} }\)

Then we prove that the expected number of total transmissions for all hosts along the path to successfully deliver one packet is \(E_{tcp} = \displaystyle { { ({ {1}\over {1-P} }) ^H - 1 }\over {P} }\).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, Y., Matta, I. Multi-layer Virtual Transport Network Design. J Netw Syst Manage 26, 755–789 (2018). https://doi.org/10.1007/s10922-017-9442-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10922-017-9442-z

Keywords

Navigation