maintain consistent integrity of the data. Guaranteed
message delivery is critical in many systems like
SCM. This is the reason that message queuing is
adopted as the communication scheme. Message
queuing communication can be divided into
communication between the device and the server
using the message queue. For example, let us
consider that the data that is obtained by the RFID
reader is processed in the remote application server.
If the synchronous communication scheme is
adopted, then when the remote application is busy,
the application will be locked up and a lot of data
will be lost. RFID cannot process other jobs while it
is waiting for the acknowledgement from the remote
application server. If asynchronous communication
like message queuing communication is adopted,
then even if the remote application is busy, the
generated message is stored in the local message
queue, sent to the remote message queue, and then
sent to the remote application server. The message
queue communication can achieve the guaranteed
message delivery.
For enterprises that want to create an SCM
system with other partners like suppliers, deliverers,
and retailers, the virtual private network (VPN)
service is a cost-effective solution. The MPLS VPN
(multiprotocol label switching virtual private
network) service can provide secure and any-to-any
connectivity to subscribers (Pepelnjak et al., 2003).
Therefore, most enterprises use a VPN service to
connect to remote applications. The MPLS VPN is
provided on a wide-area public network by the
network provider. In the MPLS VPN, any node can
belong to several VPNs if the policy of the import
and export of the routing distinguisher is suitably
configured. So, if the enterprises want to gather and
process the data obtained from several enterprise
VPNs, the network provider can provide the node as
the root message queue, which can communicate
with the enterprise client message queue nodes.
Using the MPLS fast rerouting technology, when a
failure occurs in nodes or links in the middle of the
LSP (label switched path) in the MPLS network, the
local protection mechanism for the LSP starts
immediately and becomes effective in a short time.
Compared with the enterprise network built by the
enterprise itself, it is generally more cost-effective
for users to create a message queue application
overlay network on the MPLS VPN that is provided
by the network provider.
In this paper, we consider message queuing
communication on an MPLS VPN from the
viewpoint of a network service provider. In some
VPN sites, a large amount of data is generated and
stored in the local message queue at once. The
remote message queue is in the server VPN site.
The database or application servers are in this server
VPN site. The data stored in the local message
queue in local VPN sites is sent to the remote
message queue in the server VPN site according to
the message queuing transport protocol. To keep the
integrity of the data, the local message queue makes
a copy of the original message and stores it when the
local message queue sends the original message.
The local message queue can discard the stored copy
message only when an acknowledgement from the
remote message queue has been received. The data
generating processes in the local VPN sites may be
different. Messages may be generated explosively
during a short period in some local VPN sites.
Because there is a limit on the length of the local
message queue, an overflow can occur. In this paper,
we propose a traffic control scheme. To avoid an
overflow in such a case, it is necessary to utilize the
message queue resources in the whole VPN
efficiently. In this control scheme, the rate at which
data from the local message queue in local VPN
sites is sent to the remote server message queue is
adaptively controlled according to a control rule and
the volume of messages in all local message queues
in the VPN. To confirm the effectiveness of such a
traffic control scheme in message queuing
communication, we created precise simulation
models by OPNET (OPNET) and analyzed its
effectiveness for these simulation models.
This paper is organized as follows. The
architecture of an RFID application using the
message queuing scheme is explained as an example
in section 2 and an overview of the MPLS VPN is
shown. The traffic control scheme and OPNET
modeling are explained in section 3. In section 4,
the effectiveness of the proposed traffic control
scheme is examined through simulation studies.
Section 5 summarizes the control scheme and
mentions further studies.
Figure 1: Software architecture.
Applications
(e.g., SAP, database, …)
Message queues
(e.g., MSMQ, MQ Series, JMS, …)
\Device manager/OS
(e.g., RFID, UNIX, Windows, ...)
Business processes
(e.g.,. Supply chain management)
MESSAGE QUEUING MIDDLEWARE ON VPN AND ITS TRAFFIC CONTROL SCHEME - Modeling Asynchronous
Message Queuing Communication on MPLS VPN
47