scholarly journals Implementing Multiprotocol Label Switching Technology for Secure Network Communication between Organizations

Author(s):  
Indrani Palanisamy ◽  
Hamed Abdulla Hamed Al-Bulushi

This exploratory study analyzed the current complications in the Manufacturing organizations for transferring files between two or more sites in-between an organization over an unsecured network communication. Based on the analysis we provide reliable implementation by an appropriate solution to improve and develop the performance of the network communication to help the company to progress the quality of work. The initial phase of the study analyses about Virtual Private Network (VPN) based on the network layers and identifies the underneath difficulties in VPN while data travels over the network in the form of encapsulation and the traffic of the fundamental network. Because of such an encapsulation technique used in VPN, it increases the network traffic which affects the bandwidth of a low-speed internetworking communication. By analyzing various case studies, it was identified Multiprotocol Label Switching (MPLS) technology gives a feasible solution to put the network communication on the right track. It creates secure and reliable connectivity between organization sites and was effectively implemented in the place where slow speed network for connectivity between organizations are found. The recommending this MPLS solution, it helps organizations to share and effectively utilize the servers and service between organizations for secure, reliable and effective communication. Also by considering network security factor as a very significant factor for any network, we have also implemented the Firewall which provides appropriate defense for networks that prevents from internal and external threats. At the same time, the solution also provides support to Wireless LAN Controller (WLC) for providing easy manage and control all wireless access point.     Keywords: Firewall, Multi-protocol Label Switching (MPLS), Servers, Virtual  Private Network (VPN), Wireless LAN Controller (WLC).

TecnoLógicas ◽  
2013 ◽  
pp. 425
Author(s):  
Mónica Espinosa-Buitrago ◽  
Octavio Salcedo-Parra ◽  
Ricardo Goméz-Vargas

Los routers de borde del proveedor de servicios establecen VPNs (Virtual Private Network) realizando el enrutamiento entre los usuarios y la red de núcleo (Core) por medio de Routers Virtuales (VR). Los routers virtuales establecen el enrutamiento a las redes MPLS/VPN/BGP por medio de las tablas VRF (Virtual Router Forwarding), las cuales utilizan el algoritmo de enrutamiento Borde Gateway Protocol (BGP) para sus anuncios. Las sesiones BGP son del tipo malla completa en donde se establecen mayores costos en los anuncios, por ello se realiza un análisis comparativo con rutas reflejadas, obteniendo un 31% de mejora a nivel de los costos del algoritmo, en la configuración de rutas reflejadas en la función de encapsulamiento MPLS (Multiprotocol Label Switching).


Author(s):  
Jan Schankin ◽  
Eduardo Correia

Multiprotocol Label Switching (MPLS) was originally designed with the intention of improving the speed with which routers could forward packets in Internet Protocol (IP) networks. Due to significant improvements in packet forwarding, this is no longer an advantage, but the technology has found large-scale industry-wide acceptance because of its greatly widened scope and application. Multiple extensions and enhancements to the protocol make it capable of solving an array of current service provider and customer network requirements for a converged network in an IP dominated world. The chapter considers the use of MPLS for the provisioning of a virtual private network over a shared physical infrastructure, and discusses the logic and functionality of key protocols associated with MPLS. It then goes on to explore the problems, protocols, and possibilities of these technologies in current environments.


KOMTEKINFO ◽  
2021 ◽  
pp. 169-175
Author(s):  
Prayogi Wicaksana ◽  
Febri Hadi ◽  
Aulia Fitrul Hadi

One of the ways to maintain and improve the quality of service and security on the network of an agency of the Barangin Sub-District Office, Sawahlunto City (Central) is to add a VPN feature. Administrators who always monitor the flow of traffic by accessing routers and access points to find out network conditions. There are times when the Administrator is on a public network, he or she cannot access routers and access point devices because the Public IP obtained is Dynamic (random). To solve this problem, it is done through the Network Development Life Cycle (NDLC) method by combining the L2TP and IPsec VPN protocol systems on Mikrotik. A Virtual Private Network (VPN) is a private and secure network using a public network such as the internet. One of the bases for securing VPN technology is Internet Protocol Security (IPSec). IPSec is a protocol used to secure datagram transmission on TCP/IP-based networks. This study aims to design and implement a VPN network system by utilizing a public network, where this system provides advanced security enhancements on the internet network using IPSec. The information/data sent will be confidential with an automatic encryption method through the L2TP tunnel method from the server to the branch/client computer and vice versa. The VPN is implemented using a layer 2 (L2TP) tunneling protocol using two Mikrotik routers. There are few changes to the computer network configuration to minimize costs and implementation time. Tests are carried out to implement security on the network using the command prompt, where the admin observes packet loss and delay parameters to determine the increase in security quality on the network.


2019 ◽  
Vol 5 (1) ◽  
Author(s):  
Fitra Nugraha

AbstrakPenelitian ini membahas tentang analisis keamanan Wireless LAN (Wireless Local Area Network) terhadap serangan luar pada protokol Wireless Protected Access (WPA), Web Proxy, dan Virtual Private Network (VPN), yang digunakan untuk menyerang LAN.Penelitian akan dilakukan di Jaringan UNIKUNET (Jaringan Wireless Universitas Kuningan Kampus 1) yang menggunakan captive portal sebagai media autentikasi jaringan public hotspotnya. Tiga jenis perangkat lunak yang digunakan sebagai penyerang yaitu, penyerang Visual Network Stumbler, Aircrack dan Wireshark. Perangkat lunak tersebut digunakan di laptop pada jarak 5m sampai 25m dari titik akses LAN Nirkabel. Dari hasil experimen terlihat waktu tercepat direspon oleh Protokol WPA diberikan oleh penyerang Visual Network Stumbler, diikuti oleh Aircrack dan Wireshark, dan kemungkinan celah keamanan yang didapat.Kata kunci: Wireless Protected Access, Captive Portal, WLAN, Web Proxy dan Virtual Private Network�AbstractThis study discusses the analysis of Wireless LAN (Wireless Local Area Network) security against external attacks on the Wireless Protected Access (WPA), Web Proxy, and Virtual Private Network (VPN) protocols, which are used to attack LANs.The research will be conducted at the UNIKUNET Network (Kuningan University Campus Wireless Network 1) that uses captive portal as a media authentication for its public hotspot network. Three types of software are used as attackers, namely, attackers Visual Network Stumbler, Aircrack and Wireshark. The software is used on laptops at a distance of 5m to 25m from the Wireless LAN access point. From the experimental results, it was seen that the fastest time was responded to by the WPA Protocol provided by Visual Network Stumbler attackers, followed by Aircrack and Wireshark, and possible security gaps were obtained.Keywords: Wireless Protected Access, Captive Portal, WLAN, Web Proxy and Virtual Private Network�


2017 ◽  
Vol 5 (4RACEEE) ◽  
pp. 58-67
Author(s):  
Prabhavati Biradar ◽  
Purushottama T L

Multiprotocol Label Switching (MPLS) is a switching technology. MPLS-TP is a progressive version of MPLS in the field of packet switched data network. MPLS-TP is a high-end technology which implements network methodologies in a transport layer. For managing virtual private network(VPN) services, MPLS is of developing enthusiasm to the service providers (SPs) and furthermore to VPN customers. MPLS-enabled routers allot a few labels to the packets, and in view of these allocated labels it produces sending decisions. The prime expectation after the MPLS technology is to eliminate the need of OSI model data link layered (layer-2) technology i.e. frame relay, Ethernet, asynchronous transfer mode (ATM). This paper gives data about the components of Multi-Protocol Label Switching (MPLS), correlation of MPLS with traditional Routing and Packet Switching, MPLS label format and MPLS operation.


The Winners ◽  
2007 ◽  
Vol 8 (2) ◽  
pp. 155
Author(s):  
Ariefah Rachmawati

Data communication network, part of the information technology, becomes so important in communicating information and transferring data. Most companies in the world, including companies operating in Indonesia, have used data communication networking technology for their day-to-day operation. However, transferring data through network has some security problems. Therefore, accountants should be familiar with and have knowledge about it in order to ensure high quality work that they provide. Based on IETF – Internet Engineering Task Force a (RFC (Request for Comment)-3031), it is stailea that information technology used to communicate and transfer information as well as data should be efficient and safe.  Multiprotocols Label Switching (MPLS) is a new technology used in virtual private network is one of the solutions in making data transfer efficient and safe.


2021 ◽  
Vol 6 (4) ◽  
pp. 90-101
Author(s):  
Mohd Faris Mohd Fuzi ◽  
Mohamad Ridzuan Mohd Alias ◽  
Naginder Kaur ◽  
Iman Hazwam Abd Halim

Virtual Private Network (VPN) is a private network that uses public network to tunnel the connection from the users’ end to the VPN server. VPN allows users to create a secure connection to another network over the public Internet. VPNs can be used to shield users’ browsing activity and encrypts data transmitted over the network to prevent sniffing attack. Nowadays, users can either pay a premium price for a good VPN service or risk their privacy using free browser-based VPN. Thus, SafeSearch is developed to address these issues in mind. With SafeSearch, users will not need to fork out a lot of money for premium VPN subscription services or expose themselves to targeted advertising when utilising free browser-based VPN. In this study, open VPN protocol was used to create the VPN server on a microcomputer called Raspberry Pi. The software used was mostly open-source except for the VPN client. Obfuscation technique was used to hide VPN traffic by disguising it as just another normal Internet traffic against Deep Packet Inspection when passing through firewall. After the VPN server was established, tests were carried out to evaluate the functionality and reliability of the VPN server in “real-world” environment. The tests conducted were network restriction penetration assessment, network performance and user acceptance test. Penetration assessment result showed that SafeSearch is capable of bypassing web filtering and deep packet inspection. Network performance during SafeSearch connection has slight latency and bandwidth decline, although it is not overly affected. The outcome of the user acceptance test was positive as the majority of participants of the study were confident that SafeSearch can secure their connection and protect their privacy when browsing the web. To conclude, both objectives of this project were fully achieved and the scope of study was followed thoroughly.


Sign in / Sign up

Export Citation Format

Share Document