TY - GEN
T1 - Agent-based VPN architecture
T2 - 15th International Conference on Advanced Computing and Communication, ADCOM 2007
AU - Medhi, D.
AU - Choi, B. Y.
AU - Scoglio, C.
AU - Song, S.
AU - Dispensa, S.
PY - 2007
Y1 - 2007
N2 - Remote access VPN services have gained significant popularity in recent years. In this paper, we present the basic framework of an agent-based VPN architecture (ABVA) in which organizations do not need to maintain VPN servers. We then consider the problem of the user connectivity decision in an ABVA, which consists of the selection of the best Rendezvous Point (RP) for each user in a heterogeneous access environment. Specifically, we consider the optimal user connectivity problem from the perspective of an ABVA provider. For the static case of known users, we present an optimization formulation. An advantage of our formulation is that it can incorporate users with heterogeneous access technology, along with delay and penalty factors. Through our computational study, we observe that the delay factor is not necessarily dominant in all cases, while the bandwidth access requirement plays a critical factor in an overloaded situation. Finally, we briefly comment on how the results from the static case are useful with regard to the random arrival case.
AB - Remote access VPN services have gained significant popularity in recent years. In this paper, we present the basic framework of an agent-based VPN architecture (ABVA) in which organizations do not need to maintain VPN servers. We then consider the problem of the user connectivity decision in an ABVA, which consists of the selection of the best Rendezvous Point (RP) for each user in a heterogeneous access environment. Specifically, we consider the optimal user connectivity problem from the perspective of an ABVA provider. For the static case of known users, we present an optimization formulation. An advantage of our formulation is that it can incorporate users with heterogeneous access technology, along with delay and penalty factors. Through our computational study, we observe that the delay factor is not necessarily dominant in all cases, while the bandwidth access requirement plays a critical factor in an overloaded situation. Finally, we briefly comment on how the results from the static case are useful with regard to the random arrival case.
UR - http://www.scopus.com/inward/record.url?scp=51849083377&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=51849083377&partnerID=8YFLogxK
U2 - 10.1109/adcom.2007.130
DO - 10.1109/adcom.2007.130
M3 - Conference contribution
AN - SCOPUS:51849083377
SN - 0769530591
SN - 9780769530598
T3 - Proceedings of the 15th International Conference on Advanced Computing and Communications, ADCOM 2007
SP - 138
EP - 143
BT - Proceedings - CIS Workshops 2007, 2007 International Conference on Computational Intelligence and Security Workshops, CISW 2007
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 18 December 2007 through 21 December 2007
ER -