Fig 1 - uploaded by Ndidi Stella Arinze
Content may be subject to copyright.
Architecture of MPLS-VPN The core network of the MPLS consists of PE and P routers and PE routers are used to provide VPN services to the customers. Customer routers (CEs) are connected to the PEs. In MPLS-VPN technology packets can be transferred and processed in three different planes namely control, data and management planes. Each of these planes handle different functions in an enabled MPLS network. Exchanging, processing and establishing of routing information are done in a control plane, while data plane handle the implementation of those VPN data. Management plane is where the entire equipment configuration is managed. All these planes in an MPLS-VPN experience different security

Architecture of MPLS-VPN The core network of the MPLS consists of PE and P routers and PE routers are used to provide VPN services to the customers. Customer routers (CEs) are connected to the PEs. In MPLS-VPN technology packets can be transferred and processed in three different planes namely control, data and management planes. Each of these planes handle different functions in an enabled MPLS network. Exchanging, processing and establishing of routing information are done in a control plane, while data plane handle the implementation of those VPN data. Management plane is where the entire equipment configuration is managed. All these planes in an MPLS-VPN experience different security

Source publication
Article
Full-text available
Presently, Multi-Protocol Label Switching (MPLS) is the global data transmission technology used for delivery of voice and multimedia applications in Virtual Private Network (VPN). The main purpose of security is to protect the network assets. However, insecurity issues on the cloud of MPLS-VPN system remain the major challenges for the network des...

Similar publications

Article
Full-text available
Cloud computing is one of those emerging technologies that has occupied vital importance in today's age. The proficiency of lessening expenses of computing, growing scalability and flexibility for storage related computer processes has made it to attain prime place in emerging trends. In cloud computing, entire data exist over a set of interconnect...

Citations

... The idea of several security techniques such as Intrusion Detection System (IDS), Secure Socket Layer Encryption, Cryptographic Hashing Algorithm --(Message Digest 5 (MD5) and Security Hash Algorithm), Advanced Encryption Standard, Rivest-Shamir-Adlehman (RSA), Diffie-Hellman and IP Security. The results obtained that the IDS technique is suitable for use in strengthening security in and out of cloud MPLS [6]. ...
Article
p class="AbstractL-MAG">Tunneling is an interconnection solution between local networks separated by remote over a public IP. The current issue does not have proper guidelines for using tunneling techniques. Tunneling selection is generally only based on the beliefs and experience of network management operators or following SOP. The brand of tunneling device is widely used by telecommunication operators in Indonesia (especially P. Java) is Nokia. In this study, implementation, testing and analysis of MPLS techniques on Nokia devices to produce recommendations when to use MPLS tunnels according to network topology appropriately. The software used in this study was FTP, Tfgen and Wireshark. FTP and Tfgen as network traffic generators and Wireshark to record throughput, delay and downtime. Analysis of MPLS on Nokia devices is conducted based on recording results for various traffic engineering scenarios including loadless conditions, and various other conditions in case of network disruption. Mpls research results when without load all went well with an average throughput of 1.08 Mbps and delay of 10 ms. When with load has a stability delay of 10 ms, when when network disruption using ICMP get 1 Request Time Out or 4s. MPLS techniques are used on established networks because it can provide alternative density lines.</p