Preview

Traffic Protection as a Service in MPLS Cloud Network

Powerful Essays
Open Document
Open Document
4066 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Traffic Protection as a Service in MPLS Cloud Network
International Review on Computers and Software (I.RE.CO.S.), Vol. 8, n. 7
July 2013

Traffic Protection as a Service in MPLS Cloud Network
Mouhannad Alnouri1 and Rand El-Koutly2
1

2

Faculty of Information Technology Engineering, Damascus University, Syria
Associated professor, Faculty of Information Technology Engineering, Damascus
University, Syria

Abstract – Data network is the nervous system and the heart of digital information transferring, it’s hold all applications information such as data, voice and video and due to this issue reliability of the data network is the critical mission to keep our digital life and business running 24 by 7, protection the data network in term of availability in the past was relaying on hardware and resources duplication which suffer lack of efficiency in utilization and inability to deliver the reliability based on requirement of the last mile applications, cloud computing come into the place to introduce a new paradigm of utilizing resources and reducing the cost of ownership, it’s capable to offer Reliability as a Service (RaaS) when it’s integrated with the infrastructure layer, this integration is the key to achieve this goal where
Multi-protocol Label Switching MPLS is linking the applications with infrastructure layer, this paper present the collaboration studies of protection components and integration with cloud computing to present the solution to offer reliability to the applications. Copyright © 2013 Praise Worthy Prize S.r.l. - All rights reserved.

Keywords: Network Protection, Protection Cloud computing, MPLS FRR, Failure recovery, Reliability as a Service RaaS, service restoration.

I.

Introduction

Due to flexibility and scalability of IP network and demanding of high speed data switching and reliability of
Asynchronous Transfer Mode ATM, Multi-Protocol
Label Switch (MPLS) [1] has been invented, the concept of MLPS is to present new forwarding paradigm to integrate IP and



References: Sept. 1999. “Experimental Study of Internet Stability and Wide-Area Backbone Failure”, Technical report, 1999. Networking”, Prentice Hall PTR, Upper Saddle River, New Jersey, 2003. Networking”, Prentice Hall PTR, Upper Saddle River, New Jersey, 2003. University, Cairo- Egypt, 1996. He got also PH.D Degree, in Digital Communication, Signal processing, from Faculty of Engineering (Communication and Electronics Department), Ain-Shams University, Cairo- Egypt, 1999

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Assigned: Sep 2, 2011 Due: Sep 15, 2011 1:30 PM in class Lead TAs: Athula Balachandran Wolf Richter…

    • 733 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    cost to run and maintain the system. By increasing system efficiency the company is able…

    • 2578 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    The network diagram of Global Finance, Inc. (GFI) depicts the layout of the company’s mission critical systems. The company has two servers (Email and the Oracle database) which are used more than any of their other systems. GFI heavily depend on their network to be stable because of their financial systems that are running and any outage would negatively affect their operations and financial situation. Like all other business, customer satisfaction and the security of GFI’s network is crucial. In order to ensure their network and data is secure, GFI has begun to re-evaluate their network infrastructure. GFI has had some service interruptions that has cost them over $100,000 in revenue losses.…

    • 887 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Some organizations use the public internet as their WAN infrastructure. While it is cheaper, the internet does not guarantee delivery or security. A security solution for maintaining high WAN service availability is to obtain WAN service availability SLA’s. Deploy redundant internet and WAN connections when 100 percent availability is required.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    So how should an organization or person protect its valuable digital processing infrastructure? A business should establish and implement a comprehensive information assurance plan. Individuals should at least address the components of a professional information assurance plan. Doing so is evidence that the infrastructure owners are attempting to practice due diligence.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IT321 Final Exam Paper

    • 1235 Words
    • 5 Pages

    38. (T or F) MPLS (Multiprotocol Label Switching)relies on a variable-length label to configure forwarding of datagrams between MPLS-compliant routers.…

    • 1235 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    must be recoverable in the event of system failure or natural disaster. To accomplish this, you…

    • 314 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Fitzgerald, J. & Dennis, A. (2009). Business data communications & networking (10th ed.). 16-19. Hoboken, NJ: Wiley.…

    • 1605 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Cis 500- Cloud Computing

    • 1078 Words
    • 5 Pages

    Technology has taken great leaps of advancement. Some of the new technology that companies and consumers are taking advantage of to store and process data is cloud computing. Cloud computing was derived from virtualization. Virtualization allows companies to separate business applications from hardware. Doing this gives the company the capability of assigning applications as needed. The option to manage applications is a great benefit to companies. Resulting from the virtualization error, cloud computing has emerged to provide flexible IT infrastructures. This has not only enhanced the options companies now have, but it is also proven to be more cost efficient. This has increasingly become a preferred method of companies and consumers alike. (Turban, & Volonino, 2011, p.47)…

    • 1078 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    Paper on Physical Security

    • 4681 Words
    • 19 Pages

    An important consideration of an information or operating system of a business or organization is to have a security system that protects information, data, and integrity of the company’s sensitive information and records. If a business or company does not have adequate security, financial, sensitive, and classified information may be compromised and prone to possible viruses and malware, hacking, or at risk of a cyber-attack to the company’s data resulting in possible financial loss. If this scenario is the case, extensive resources most likely will be required to repair or undo the damage caused by the breach of security or virus. This essay will discuss the Service Request SR-rm-013 for Riordan Manufacturing and address security issues and concerns. In addition, this document proposes solutions, methods, and options, and provide information that would best suit the company’s needs and requirements for the security and integrity of sensitive data, based on Riordan’s current security, operating system, and database.…

    • 4681 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Given a computer network for data transmission, identify and analyze the possibilities for loss or modification of data and demonstrate techniques to safeguard data from loss, modification or improper disclosure during transmission by using encryption, digital signatures, cryptographic seals and time stamp techniques and describe how they provide the elements of secrecy, authenticity, detection of modification and detection of reuse of the transaction data.…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality.…

    • 2224 Words
    • 9 Pages
    Satisfactory Essays