Layer 1 VPN NMS Based on Each VPN Customer

  • Hiroshi Matsuura
  • Naotaka Morita
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5297)


A virtual private network (VPN) makes it possible for a customer to use a wide range network by borrowing a provider network. In addition, by recent emergence of the layer 1 VPN (L1VPN), more customers require to control the end-to-end path setting on VPN by using path computation traffic engineering. We propose a customer-based L1VPN network management system (NMS) that is separated from a provider NMS. This customized NMS enables each customer to explicitly control a customer IP path from an end-to-end point of view. The separation of each customer L1VPN NMS from a provider NMS also releases the provider NMS from a huge burden. We implement a management and control function in an L1VPN NMS by using enterprise java beans (EJBs). Then, we discuss and evaluate the merits of the proposed NMS.




Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Takeda, T., Inoue, I., Aubin, R., Carugi, M.: Layer 1 virtual private networks: service concepts, architecture requirements, and related advances in standardization. IEEE Commun. Mag. 42(6), 132–138 (2004)CrossRefGoogle Scholar
  2. 2.
    Bonerjee, A., Drake, J., Lang, J.P., Turner, B.: Generalized multiprotocol label switching: an overview of routing and management enhancements. IEEE Commun. Mag. 39(1), 144–150 (2001)CrossRefGoogle Scholar
  3. 3.
    Matsuura, H., Murakami, T., Takami, K.: An Interdomain Path Computation Server for GMPLS Networks. IEICE Trans. Commun. E88-B(8), 3329–3342 (2005)CrossRefGoogle Scholar
  4. 4.
    Oki, E., Shimazaki, D., Shiomoto, K.: Generalized traffic engineering protocol for multi-layer GMPLS networks. IEICE Trans. Commun. E88-B(10), 3386–3894 (2005)Google Scholar
  5. 5.
    Ash, J., Roux, J.L.: Path Computation Element (PCE) Communication Protocol Generic Requirements, RFC 4657 (September 2006)Google Scholar
  6. 6.
    Matsuura, H., Takami, K.: Hierarchically Distributed PCE for End-to-End Bandwidth-Assured VPN Service. IEICE Trans. Commun. E90-B(11), 3042–3051 (2007)CrossRefGoogle Scholar
  7. 7.
    Takeda, T., Ohba, T., Inoue, I., Urushidani, S.: Resource management in layer 1 virtual private networks. IEICE Trans. Commun.  E88-B(8), 3343–3352 (2005)CrossRefGoogle Scholar
  8. 8.
    Takeda, T., Brungard, D., Papadimitriou, D., Ould-Brahim, H.: Layer 1 virtual private networks: driving forces and realization by GMPLS. IEEE Commun. Mag. 43(7), 60–67 (2005)CrossRefGoogle Scholar
  9. 9.
    Jing, W., Michel, S., Savoie, M., Campbell, S., Bill, A.: Layer 1 virtual private network management by users. IEEE Commun. Mag. 44(12), 86–93 (2006)CrossRefGoogle Scholar
  10. 10.
    Java Community Process, JSR-000220 Enterprise JavaBeans 3.0 (Final Release),
  11. 11.
    Dijkstra, E.W.: A Note on Two Problems in Connexion with Graphs. Numerische Mathemakik 1, 271–299 (1959)MathSciNetzbMATHGoogle Scholar
  12. 12.
    Ma, Q., Steenkiste, P.: On Path Selection for Traffic with Bandwidth Guarantees. In: Proceedings of IEEE International Conference on Network Protocols (October 1997)Google Scholar
  13. 13.
  14. 14.
  15. 15.
  16. 16.
    ITU-T Recommendation for M.3100, Generic network information model (2005) Google Scholar
  17. 17.
    ITU-T Recommentdation for G.805, Generic functional architecture of transport networks (2000) Google Scholar
  18. 18.

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Hiroshi Matsuura
    • 1
  • Naotaka Morita
    • 1
  1. 1.NTT Service Integration LaboratoriesTokyoJapan

Personalised recommendations