Analysis of Senerio Based Security Protocols using MPLS VPN Network

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends  (IJCOT)          
 
© 2017 by IJCOT Journal
Volume - 8 Issue - 6
Year of Publication : 2018
Authors :  Shahjehan Khalid, Raheela Nasim
DOI : 10.14445/22492593/IJCOT-V8I6P304

Citation

MLA Style:Shahjehan Khalid, Raheela Nasim "Analysis of Senerio Based Security Protocols using MPLS VPN Network" International Journal of Computer and Organization Trends 8.6 (2018): 14-16.

APA Style:Shahjehan Khalid, Raheela Nasim (2018). Analysis of Senerio Based Security Protocols using MPLS VPN Network. International Journal of Computer and Organization Trends, 8(6), 14-16.

Abstract

The Internet continuously increase time by time in terms of bandwidth, number of hosts, geographic size, and traffic volume. As the Backbone network is suffering from congestion, traffic shaping, Load balancing over unequal cost path, increasing number of user, scalability and some other critical issues the MPLS is the only one solution, which is performing its best functionalities using some applications like traffic engineering, MPLS VPN. By implementing traffic engineering in backbone area bandwidth resources are optimized that results to reduce the overall cost of operations. MPLS also enhance the core network security due to its label switching functions. But the main security issues on MPLS VPN core network are if someone try to connect VPN from public network to MPLS VPN core network then it may be a security risk because public network used by everyone, footprint applies, trace the data packets and compromise the network security. Encryption, decryptions applied on traffic or data packets that come from public network to MPLS core network by implementing different methods/strategies. MPLS has become widespread and has been several deployments by service suppliers in their networks. The results of MPLS network will be calculated by using network simulator like (Packet Tracer, GNS3 etc.). The work exhibited in this exploration will show results from simulations using optimal fuzzy based algorithm for traffic engineering and congestion avoidance.

References

[1] A1mofary, H., S. Moustafa and W. Zaki. 2013. Scalabi1ity Aspects in BGP.MPLS VPN.Internationa1 Journa1 of Modern Engineering Sciences, 2(1):17-27.
[2] Ahmed, D.2017. Performance Eva1uation of QOS for Rea1 Time Ap1ications Using Mu1tiprotocol Labe1 Switching.Sudaan University of Science & Techno1ogy Collage of Graduate Studies.2 (4):1-49
[3] Bhatia, R., F. Hao and Murali. 2015. Optimized network trafficengineering using segment routing. Computer Communications (1NFOCOM), 2015 1EEE Conference on.2(l):1-15.
[4] Chen. Y., S. Zhang and Shugong.2011. Fundmenta1 trade-offs on green wire1ess Networks. 1EEE Communications Magazine. 49(6):66l-665.
[5] Dhuri, K. and A. Shaikh.2014. Review on QoS 1mprovement with MPLS Mechanism in N-G-N. Internationa1 Journa1 of 1novative Research in Science, Engineering and Technology. 3(2):9431-9438.
[6] François, F., N. Wang., K. Moesner., S. Georgulas and O1iveira.2014. Levrging MPLS Backup Path for Distributed Energy AwareTrafficEngineering. 1EEE transactions on network and service management. 11(2).235-249.
[7] Hussein and Adnan. 2013. Effects of some Security Mechanism on the QOS VO1P App1ication using OPNET. 1nternationa1 Journa1 of Current Engineering and Techno1ogy. 3(5):l626-1630.

Keywords
Bandwidth, Congestion Traffic, Load Balancing, MPLS VPN Network, Traffic Engineering, Security Protocols.