Proceedings 24th Conference on Local Computer Networks. LCN'99
DOI: 10.1109/lcn.1999.802006
|View full text |Cite
|
Sign up to set email alerts
|

An architecture for managing QoS-enabled VPNs over the Internet

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…The Internet Engineering Task Force (IETF) proposed the VPN standard IPSec [KA98], which is supported by many vendors nowadays. However, VPNs and especially their cryptographic mechanisms are difficult to understand and manage [GBK99]. Therefore, service providers begin to offer VPN services where they setup and manage the tunnel end-points for their customers.…”
Section: Controlling a Virtual Private Network Servicementioning
confidence: 99%
See 1 more Smart Citation
“…The Internet Engineering Task Force (IETF) proposed the VPN standard IPSec [KA98], which is supported by many vendors nowadays. However, VPNs and especially their cryptographic mechanisms are difficult to understand and manage [GBK99]. Therefore, service providers begin to offer VPN services where they setup and manage the tunnel end-points for their customers.…”
Section: Controlling a Virtual Private Network Servicementioning
confidence: 99%
“…How to provide services that demand for collaboration between providers? In earlier work [GBK99] we propose a generic architecture to cope with these problems. However, there are two problems to solve that go beyond the deployment of the service, namely: point-of-view this is equivalent to the question how can (s)he control if (s)he gets the quality the provider promised.…”
Section: Introductionmentioning
confidence: 99%
“…These topics include the business model, the security architecture necessary, a design for the monetary transactions involved and SLA routing. We want to deploy the results of this paper in a more general service broker architecture that we proposed in [5]. An implementation of bandwidth brokers using the limited notification approach is planned.…”
Section: Discussionmentioning
confidence: 99%
“…There are some special cases however, such as virtual private networks (VPN) [3]. If a host network wants to establish a QoS enabled VPN [5] it could set up an SLA describing the VPN requested. Usually, the VPN peers are known in advance, such as a company's head-quarters and its branch offices.…”
Section: Lack Of Destination Information In Notificationsmentioning
confidence: 99%
“…To provide VLL type services by exploiting these emerging technologies, we [14], [5], [16], [12] and others [22], [26] have proposed the implementation of Bandwidth Brokers. This allows users to specify a guaranteed service (i.e.…”
Section: Introductionmentioning
confidence: 99%