Journal of Network and Systems Management

, Volume 26, Issue 3, pp 755–789 | Cite as

Multi-layer Virtual Transport Network Design

  • Yuefeng WangEmail author
  • Ibrahim Matta


Service overlay networks and network virtualization enable multiple overlay/virtual networks to run over a common physical network infrastructure. They are widely used to overcome deficiencies of the Internet (e.g., resiliency, security and QoS guarantees). However, most overlay/virtual networks are used for routing/tunneling purposes, and not for providing scoped transport flows (involving all mechanisms such as error and flow control, resource allocation, etc.), which can allow better network resource allocation and utilization. Most importantly, the design of overlay/virtual networks is mostly single-layered, and lacks dynamic scope management, which is important for application and network management. In response to these limitations, we propose a multi-layer approach to virtual transport network (VTN) design. This design is a key part of VTN-based network management, where network management is done via managing various VTNs over different scopes (i.e., ranges of operation). We explain the details of the multi-layer VTN design problem as well as our design algorithms, and focus on leveraging the VTN structure to partition the network into smaller scopes for better network performance. Our simulation and experimental results show that our multi-layer approach to VTN design can achieve better performance compared to the traditional single-layer design used for overlay/virtual networks.


Multi-layer network design Virtual transport network Network management 



This work has been partly supported by National Science Foundation awards: CNS-0963974 and CNS-1346688.


  1. 1.
    Kurian, J., Sarac, K.: A survey on the design, applications, and enhancements of application-layer overlay networks. ACM Comput. Surv. 43(1), 5:1–5:34 (2010)CrossRefGoogle Scholar
  2. 2.
    Galán-Jiménez, J., Gazo-Cervero, A.: Overlay networks: overview, applications and challenges. IJCSNS 10(12), 40 (2010)Google Scholar
  3. 3.
    Anderson, T., Peterson, L., Shenker, S., Turner, J.: Overcoming the internet impasse through virtualization. Computer 4, 34–41 (2005)CrossRefGoogle Scholar
  4. 4.
    Chowdhury, N.M.K., Boutaba, R.: A survey of network virtualization. Comput. Netw. 54(5), 862–876 (2010)CrossRefzbMATHGoogle Scholar
  5. 5.
    Wang, Y., Matta, I.: SDN management layer: design requirements and future direction. In: Workshop on Control, Operation, and AppLication in SDN Protocols (CoolSDN 2014), Co-located with ICNP 2014, Raleigh, NC, USA, October (2014)Google Scholar
  6. 6.
    Wang, Y., Matta, I.: A recursive approach to network management. In: Technical Report BUCS-TR-2015-014, Boston University (2015)Google Scholar
  7. 7.
    Day, J.: Patterns in Network Architecture: A Return to Fundamentals. Prentice Hall, Upper Saddle River (2008)Google Scholar
  8. 8.
    Day, J., Matta, I., Mattar, K.: Networking is IPC: a guiding principle to a better internet. In: Proceedings of ReArch’08-Re-architecting the Internet (Co-located with CoNEXT), New York, NY, USA (2008)Google Scholar
  9. 9.
    Wang, Y., Matta, I., Esposito, F., Day, J.: Introducing ProtoRINA: a prototype for programming recursive-networking policies. ACM SIGCOMM Comput. Commun. Rev. (CCR) 44, 129–131 (2014)CrossRefGoogle Scholar
  10. 10.
    US Ignite Initiative.
  11. 11.
    Andersen, D., Balakrishnan, H., Kaashoek, F., Morris, R.: Resilient overlay networks. In: Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles, ser. SOSP ’01. ACM, New York, NY, USA, pp. 131–145 (2001).
  12. 12.
    Jannotti, J., Gifford, D.K., Johnson, K.L., Kaashoek, M.F., et al.: Overcast: reliable multicasting with an overlay network. In: Proceedings of the 4th Conference on Symposium on Operating System Design and Implementation, vol. 4. USENIX Association, pp. 14–14 (2000)Google Scholar
  13. 13.
    Subramanian, L., Stoica, I., Balakrishnan, H., Katz, R.H.: OverQoS: an overlay based architecture for enhancing internet QoS. In: NSDI, vol. 4, p. 6 (2004)Google Scholar
  14. 14.
    Keromytis, A.D., Misra, V., Rubenstein, D.: SOS: secure overlay services. In: Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ser. SIGCOMM ’02. ACM, New York, NY, USA, pp. 61–72 (2002).
  15. 15.
  16. 16.
    Open Stack: Neutron Project.
  17. 17.
    Sherwood, R., Gibb, G., Yap, K.K., Appenzeller, G., Casado, M., McKeown, N., Parulkar, G.: FlowVisor: a network virtualization layer. In: Technical Report, OpenFlow-TR-2009-1, OpenFlow Consortium (2009)Google Scholar
  18. 18.
    Jin, X., Gossels, J., Rexford, J., Walker, D.: CoVisor: a compositional hypervisor for software-defined networks. In: NSDI. USENIX Association, Berkeley, CA, USA (2015)Google Scholar
  19. 19.
    Kamel, M., Scoglio, C., Easton, T.: Optimal topology design for overlay networks. NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, pp. 714–725 (2007)Google Scholar
  20. 20.
    Li, Z., Mohapatra, P.: On investigating overlay service topologies. Comput. Netw. 51(1), 54–68 (2007)CrossRefzbMATHGoogle Scholar
  21. 21.
    Adami, D., Callegari, C., Giordano, S., Nencioni, G., Pagano, M.: Design and performance evaluation of service overlay networks topologies. In: International Symposium on Performance Evaluation of Computer Telecommunication Systems, 2009. SPECTS 2009, vol. 41, pp. 296–303, July 2009Google Scholar
  22. 22.
    Han, J., Watson, D., Jahanian, F.: Topology aware overlay networks. In: INFOCOM: 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, vol. 4, pp. 2554–2565. IEEE (2005)Google Scholar
  23. 23.
    Vieira, S.L., Liebeherr, J.: Topology design for service overlay networks with bandwidth guarantees. In: Twelfth IEEE International Workshop on Quality of Service: IWQOS 2004. IEEE, pp. 211–220 (2004)Google Scholar
  24. 24.
    Zhou, L., Sen, A.: Topology design of service overlay network with a generalized cost model. In: Global Telecommunications Conference: GLOBECOM’07. IEEE, pp. 75–80 (2007)Google Scholar
  25. 25.
    Barla, I.B., Schupke, D., Hoffmann, M., Carle, G., et al.: Optimal design of virtual networks for resilient cloud services. In: 2013 9th International Conference on the Design of Reliable Communication Networks (DRCN). IEEE, pp. 218–225 (2013)Google Scholar
  26. 26.
    Fan, J., Ammar, M.H.: Dynamic topology configuration in service overlay networks: a study of reconfiguration policies. In: INFOCOM (2006)Google Scholar
  27. 27.
    ETSI: Network functions virtualisations (NFV)—white paper.
  28. 28.
    Santiváñez, C.A., Ramanathan, R., Stavrakakis, I.: Making link-state routing scale for ad hoc networks. In: Proceedings of the 2Nd ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, New York, NY, USA, pp. 22–32 (2001)Google Scholar
  29. 29.
    Ratnam, K., Matta, I.: WTCP: an efficient mechanism for improving wireless access to TCP services. Int. J. Commun. Syst. 16(1), 47–62 (2003)CrossRefzbMATHGoogle Scholar
  30. 30.
    Balakrishnan, H., Padmanabhan, V.N., Seshan, S., Katz, R.H.: A comparison of mechanisms for improving TCP performance over wireless links. IEEE/ACM Trans. Netw. 5(6), 756–769 (1997)CrossRefGoogle Scholar
  31. 31.
    Sindelar, M., Sitaraman, R.K., Shenoy, P.: Sharing-aware algorithms for virtual machine colocation. In: Proceedings of the Twenty-Third Annual ACM Symposium on Parallelism in Algorithms and Architectures, ser. SPAA ’11. ACM, New York, NY, USA, pp. 367–378 (2011)Google Scholar
  32. 32.
  33. 33.
    Medina, A., Lakhina, A., Matta, I., Byers, J.: BRITE: an approach to universal topology generation. In: MASCOTS (2001)Google Scholar
  34. 34.
    Wang, Y.: ProtoRINA 2.0. (2016)
  35. 35.
  36. 36.
    Grinstead, C.M., Snell, J.L.: Introduction to Probability. American Mathematical Society, Providence (2012)zbMATHGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2017

Authors and Affiliations

  1. 1.Akamai Technologies, Inc.CambridgeUSA
  2. 2.Computer Science DepartmentBoston UniversityBostonUSA

Personalised recommendations