Research of Network Testing Based on MPLS L2VPN

2013 ◽  
Vol 791-793 ◽  
pp. 1695-1698
Author(s):  
Xuan Yu Qian ◽  
Shi Min Liu ◽  
Cheng Zhou ◽  
Xiao Juan Guan

MPLS (Multi-Protocol Label Switching) VPN is based on MPLS technology and construct virtual private network (VPN) on backbone network, to provide users with safe, reliable, high-quality business technology VPN. MPLS L2VPN (Layer 2 VPN) is one type of solutions of MPLS VPN. The MPLS L2VPN technology, after years of researching and practicing, is becoming mature, and many RFCs and related drafts are published to standardize it. However, there is not much research of network test method on the MPLS L2VPN technology, this paper analyzes the various MPLS L2VPN solutions and make a reach on test method based on two types solutions: Martini and Kompella.

2017 ◽  
Vol 11 (60) ◽  
pp. 2967-2980
Author(s):  
Diego F. Rocha ◽  
Octavio Jose Salcedo Parra ◽  
Giovanny Mauricio Tarazona Bermudez

The paper must have abstract. The rapid growth of networks base on IP, and the current challenge posed by the technological deployment of IPv6 and annexed applications, challenges that must confront the Internet Service Provider and have stimulated the development for rigorous researches on the topic. The Internet Service Providers ISP offer infrastructure for implementation of virtual private network VPN, where is fundamental the definition of routing schemas between the border route of client CE and the provider PE. In this sense, have been proposed different schemas where the new protocols as Open Short Path First version 3 OSPFv3 have a key role. In the context of VPN, the routing protocol BGP is used to distribute the client’s path, the multi-protocol label switching MPLS is used to send the information packages through the network core in tunnel mode. Originally, only IPv4 was supported and expanded after support OSPFv2 and VPN IPv6. Based on the new specifications in order to support OSPFv3 as a routing protocol PE-CE and the current technological infrastructures begin the process of IPv6 deployment, these elements driving this research which evaluate the performance of routing protocol OSPFv3 on border scenarios MPLS/VPN/IPv6.


Compiler ◽  
2014 ◽  
Vol 3 (1) ◽  
Author(s):  
Ibrahim Saleh ◽  
Hero Wintolo ◽  
Dwi Nugraheny

MPLS (Multi Protocol Label Switching) technology has been developed and mostly used by the service provider on their main network. Data packets which forwarded from one router to another router can also use VPN (Virtual Private Network) technology. VPNs were developed in the field of computer networks now have many variants, such as MPLS VPN and VPN which connects between computers or a LAN through a public network is the internet. The purpose of this final task is build a lab scale VPN network with MPLS technology use Mikrotik router RB 750GL and create a VPN connection to the STTA campus network passing the public internet. Then do a comparative analysis of the time required and the speed of transfer on both the network. The results of a comparative analysis between MPLS and VPN with the same file capacity, it appears that the MPLS network is faster in time speed and transfer speed


2021 ◽  
Vol 7 (1) ◽  
pp. 33-38
Author(s):  
Ali Imran ◽  
April Rustianto

Dunia pendidikan terkhusus di sekolah-sekolah SMK Teknik Komputer dan Jaringan (TKJ) Se-Depok memerlukan teknologi untuk menunjang sarana kegiatan belajar dan mengajar secara digital atau daring. Saat ini sekolah-sekolah terhubung melalui koneksi internet, namun terdapat masalah terkait keamanan data ketika melakukan pertukaran data antar sekolah. Pada penelitian ini dibangun infrastruktur IT terkait interkoneksi jaringan komputer di sekolah TKJ Se-Depok agar dapat terhubung antar sekolah dengan keamanan yang bertingkat. Metode yang digunakan adalah metode observasi, wawancara, dan literatur untuk menganalisa jaringan yang dibutuhkan serta membuat rancangan untuk diimplementasikan dan akan dilakukan pengujian dari hasil rancangan yang diimplementasikan. Hasil penelitian ini adalah berhasil menghubungkan sekolah SMK TKJ Se-Depok dengan teknologi Virtual Private Network (VPN) berbasis Layer 2 Tunneling Protokol (L2TP) dan IP Security secara optimal yang telah diujikan, sehingga saya simpulkan bahwa rancangan dan implementasi VPN L2TP dan IPSec dapat berjalan dengan baik untuk menghubungkan antar SMK TKJ Se-Depok.


TecnoLógicas ◽  
2013 ◽  
pp. 425
Author(s):  
Mónica Espinosa-Buitrago ◽  
Octavio Salcedo-Parra ◽  
Ricardo Goméz-Vargas

Los routers de borde del proveedor de servicios establecen VPNs (Virtual Private Network) realizando el enrutamiento entre los usuarios y la red de núcleo (Core) por medio de Routers Virtuales (VR). Los routers virtuales establecen el enrutamiento a las redes MPLS/VPN/BGP por medio de las tablas VRF (Virtual Router Forwarding), las cuales utilizan el algoritmo de enrutamiento Borde Gateway Protocol (BGP) para sus anuncios. Las sesiones BGP son del tipo malla completa en donde se establecen mayores costos en los anuncios, por ello se realiza un análisis comparativo con rutas reflejadas, obteniendo un 31% de mejora a nivel de los costos del algoritmo, en la configuración de rutas reflejadas en la función de encapsulamiento MPLS (Multiprotocol Label Switching).


2019 ◽  
Vol 10 (2) ◽  
Author(s):  
Dahnial Dahnial

<p align="center"><strong>ABSTRACT</strong></p><p><em>The internet as a data transmission backbone has security threats in sending data. To overcome the security problem of every data communication that is done through a public network (public network), then a connection is needed that requires a connection between workstations running privately, so that only workstations that have access can connect, by using a virtual private network or VPN. The advantage of a VPN is that data sent over an encrypted VPN is quite safe and the secret is maintained even through the internet network because the data sent will go through the tunnel. Tunneling itself is a method for transferring data from one network to another by using a veiled internet network. Two protocols can be chosen in a VPN, namely Point to Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP). However, the performance of each of these protocols is unknown yet. To find out the performance of the two protocols we need a test with a simulation method. Using a Mikrotik router and Wireshark application with Quality of Service (QoS) parameters consisting of Packet Loss, Delay, and Throughput on 2 clients connected to the mikrotik router and each client uses a different protocol. All clients will stream videos simultaneously to get a data packet capture. The test results will be grouped into four categories, namely bad, moderate, good and very good. It is expected that data will be able to show the quality of service of both protocols. so that it can be used as a reference in the selection of VPN protocol to be used.</em></p><p><strong><em>Keywords: </em></strong><em>Quality of Service, PPTP, L2TP</em></p><p align="center"><strong>ABSTRAK</strong></p><p><em>Internet sebagai backbone pengiriman data memiliki ancaman keamanan dalam pengiriman data. Untuk mengatasi masalah keamanan setiap komunikasi data yang dilakukan melalui jaringan publik (public network) maka diperlukan suatu mekanisme yang memungkinkan koneksi antar workstation berjalan secara private, sehingga hanya workstation yang memiliki akses yang dapat saling terhubung, dengan cara memanfaatkan virtual private network atau VPN.</em> <em>Keuntungan VPN adalah data yang dikirimkan melalui VPN terenkripsi sehingga cukup aman dan rahasianya tetap terjaga meskipun melalui jaringan internet, karena data yang dikirim akan melalui tunnel.</em> <em>Tunneling sendiri merupakan metode untuk transfer data dari suatu jaringan ke jaringan lain dengan memanfaatkan jaringan internet secara terselubung. Terdapat dua protokol yang dapat dipilih dalam VPN yaitu Point to Point Tunneling Protocol (PPTP) dan Layer 2 Tunneling Protocol (L2TP). Akan tetapi belum diketahui performa dari masing – masing protokol tersebut. Untuk mengetahui kinerja dari kedua protokol tersebut diperlukan sebuah pengujian dengan metode simulasi. Menggunakan router mikrotik dan aplikasi Wireshark dengan parameter Quality of Service (QoS) yang terdiri dari Packet Loss, Delay, dan Throughtput pada 2 client yang terhubung ke router mikrotik dan setiap client akan menggunakan protokol yang berbeda. Semua client akan melakukan video streaming secara bersamaan untuk mendapatkan capture paket data. Hasil pengujian akan dikelompokkan menjadi empat kategori, yaitu kategori buruk, sedang, bagus dan sangat bagus. Diharapkan akan dihasilkan sebuah data yang dapat menunjukkan kualitas dari layanan kedua protokol tersebut. sehingga dapat dijadikan acuan dalam pemilihan protokol vpn yang akan digunakan.</em></p><strong><em>Kata kunci:</em></strong><em> Quality of Service, PPTP, L2TP</em>


Author(s):  
Manjur Kolhar ◽  
Mosleh M Abualhaj ◽  
Faiza Rizwan

Compliance with the Service Level Agreement (SLA) metric is a major challenge in a Multiprotocol Label Switching Virtual Private Network (MPLS VPN) because mandatory models must be maintained on both sides of the MPLS VPN in order to achieve end-to-end service levels. The end-to-end service of an MPLS VPN can be degraded owing to various issues such as distributed denial of service (DDoS), and Random Early Detection (RED) that prevents congestion and differentiates between legitimate and illegitimate user traffic. In this study, we propose a centralized solution that uses a SLA Violation Detector (SLAVD) and intrusion detection to prevent SLA violation.


Sign in / Sign up

Export Citation Format

Share Document