Performance of MPLS-based Virtual Private Networks and Classic Virtual Private Networks Using Advanced Metrics
نویسندگان
چکیده
منابع مشابه
MPLS Virtual Private Networks
This chapter is devoted to Virtual Private Networks (VPNs) designed with Multi Protocol Label Switching (MPLS) [14, 15, 1], one of the most elusive protocols of the network stack. Saying that MPLS is “elusive” is not overemphasizing: starting from its arduous fitting within the ISO/OSI protocol stack, continuing with its entangled relationships with several other routing and forwarding protocol...
متن کاملQoS for MPLS-based Virtual Private Networks
Rapid growth of Internet traffic and the corresponding migration of real time and multimedia services towards IP, requires the introduction of technologies able to provide users with Quality of Service (QoS) and network operators with more dynamic and flexible resource utilization. In order to deal with the performance optimization in operational networks, Multi Protocol Label Switching (MPLS) ...
متن کاملTraffic engineering for MPLS-based virtual private networks
This paper considers the traffic engineering of MPLS-based virtual private networks (VPNs) with multiple classes of service. We focus on two main issues. Firstly, we point out that the one LSP per ingress-egress pair constraint can be relaxed for the case of MPLS-based VPNs due to the ease in classifying flows on a per-VPN basis. This allows us to use LSP with finer granularity and thus better ...
متن کاملCasual Virtual Private Networks
Virtual Private Networks (VPNs) provide a cost-effective way for securing communications using public and insecure networks like the Internet. The main purpose of a VPN is to securely and transparently connect two or more remote networks to form virtually a single network, using centralized security policies for better management and protection. However, in certain scenarios, users may not requ...
متن کاملDynamic Virtual Private Networks
We extend traditional Virtual Private Networks (VPNs) with fault-tolerance and dynamic membership properties, deening a Dynamic Virtual Private Network (DVPN). We require no new hardware and make no special assumptions about line security. An implementation exhibits low overheard, provides guarantees of authenticity and conndentiality to any IP application running over the virtual network. Our ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: TELKOMNIKA (Telecommunication Computing Electronics and Control)
سال: 2018
ISSN: 2302-9293,1693-6930
DOI: 10.12928/telkomnika.v16i5.7326