The Switch Book: The Complete Guide to LAN Switching Technology
The Switch Book: The Complete Guide to LAN Switching Technology
The Latest in Virtual Private Networks: Part I
IEEE Internet Computing
Design, Implementation and Performance Evaluation of IP-VPN
AINA '03 Proceedings of the 17th International Conference on Advanced Information Networking and Applications
Network Systems Design Using Network Processors
Network Systems Design Using Network Processors
VPN Gateways over Network Processors: Implementation and Evaluation
RTAS '05 Proceedings of the 11th IEEE Real Time on Embedded Technology and Applications Symposium
IEEE Internet Computing
IEEE Communications Magazine
Scalability implications of virtual private networks
IEEE Communications Magazine
Layer 2 and 3 virtual private networks: taxonomy, technology, and standardization efforts
IEEE Communications Magazine
Virtual private networks: an overview with performance evaluation
IEEE Communications Magazine
Analysis and evaluation of a multiple gateway traffic-distribution scheme for gateway clusters
Computer Communications
A decentralized clustering scheme for transparent mode devices
Cluster Computing
Hi-index | 0.00 |
CPE-based IPsec VPNs have been widely used to provide secure private communication across the Internet. As the bandwidth of WAN links keeps growing, the bottleneck in a typical deployment of CPE-based IPsec VPNs has moved from the last-mile connections to the customer-edge security gateways. In this paper, we propose a clustering scheme to scale the throughput as required by CPE-based IPsec VPNs. The proposed scheme groups multiple security gateways into a cluster using a transparent self-dispatching technique and allows as many gateways to be added as necessary until the resulting throughput is again limited by the bandwidth of the last-mile connections. It also includes a flow-migration mechanism to keep the load of the gateways balanced. The results of the performance evaluation confirm that the clustering technique and the traffic-redistribution mechanism together create a transparent, adaptive, and highly scalable solution for building high-performance IPsec VPNs.