Preview

Traffic Protection as a Service in MPLS Cloud Network

Powerful Essays
Open Document
Open Document
4066 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Traffic Protection as a Service in MPLS Cloud Network
International Review on Computers and Software (I.RE.CO.S.), Vol. 8, n. 7
July 2013

Traffic Protection as a Service in MPLS Cloud Network
Mouhannad Alnouri1 and Rand El-Koutly2
1

2

Faculty of Information Technology Engineering, Damascus University, Syria
Associated professor, Faculty of Information Technology Engineering, Damascus
University, Syria

Abstract – Data network is the nervous system and the heart of digital information transferring, it’s hold all applications information such as data, voice and video and due to this issue reliability of the data network is the critical mission to keep our digital life and business running 24 by 7, protection the data network in term of availability in the past was relaying on hardware and resources duplication which suffer lack of efficiency in utilization and inability to deliver the reliability based on requirement of the last mile applications, cloud computing come into the place to introduce a new paradigm of utilizing resources and reducing the cost of ownership, it’s capable to offer Reliability as a Service (RaaS) when it’s integrated with the infrastructure layer, this integration is the key to achieve this goal where
Multi-protocol Label Switching MPLS is linking the applications with infrastructure layer, this paper present the collaboration studies of protection components and integration with cloud computing to present the solution to offer reliability to the applications. Copyright © 2013 Praise Worthy Prize S.r.l. - All rights reserved.

Keywords: Network Protection, Protection Cloud computing, MPLS FRR, Failure recovery, Reliability as a Service RaaS, service restoration.

I.

Introduction

Due to flexibility and scalability of IP network and demanding of high speed data switching and reliability of
Asynchronous Transfer Mode ATM, Multi-Protocol
Label Switch (MPLS) [1] has been invented, the concept of MLPS is to present new forwarding paradigm to integrate IP and



References: Sept. 1999. “Experimental Study of Internet Stability and Wide-Area Backbone Failure”, Technical report, 1999. Networking”, Prentice Hall PTR, Upper Saddle River, New Jersey, 2003. Networking”, Prentice Hall PTR, Upper Saddle River, New Jersey, 2003. University, Cairo- Egypt, 1996. He got also PH.D Degree, in Digital Communication, Signal processing, from Faculty of Engineering (Communication and Electronics Department), Ain-Shams University, Cairo- Egypt, 1999

You May Also Find These Documents Helpful

  • Powerful Essays

    cost to run and maintain the system. By increasing system efficiency the company is able…

    • 2578 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Some organizations use the public internet as their WAN infrastructure. While it is cheaper, the internet does not guarantee delivery or security. A security solution for maintaining high WAN service availability is to obtain WAN service availability SLA’s. Deploy redundant internet and WAN connections when 100 percent availability is required.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Assigned: Sep 2, 2011 Due: Sep 15, 2011 1:30 PM in class Lead TAs: Athula Balachandran Wolf Richter…

    • 733 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    IT321 Final Exam Paper

    • 1235 Words
    • 5 Pages

    38. (T or F) MPLS (Multiprotocol Label Switching)relies on a variable-length label to configure forwarding of datagrams between MPLS-compliant routers.…

    • 1235 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    must be recoverable in the event of system failure or natural disaster. To accomplish this, you…

    • 314 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    La Haine is a story about three guys who have a friend ling in coma after being shot in a riot. Vinz, Hubert, and Saïd live at the suburbs of Paris and suffer with the violence committed by the police. Vinz finds a cop's gun and decides to kill one if his friend dies. Hubert is boxer and had his gymnasium burned in the riots. However, he does not agree with Vinz.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    St. Louis Research Paper

    • 2063 Words
    • 9 Pages

    The St. Louis was a German transatlantic liner. On May 13, 1939 the St. Louis and it’s captain, Gustav Schröder, departed Hamburg, Germany with 937 passengers that were all searching for a better life in North America. After being turned away by the government of Cuba the refugees hoped to be accepted by the United States, however, president Franklin D. Roosevelt also turned them away. So now the question is, was FDR responsible for the fate of the St. Louis, and how did his reaction reflect on America’s response to the Holocaust as a whole?…

    • 2063 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Better Essays

    Full Duty Thesis

    • 1423 Words
    • 6 Pages

    There were 23,000 casualties between the union soldiers in the Battle of Gettysburg. This battle was the only one his regiment fought in during his time apart of the the Union army. Some could say Daniel was lucky because he became ill shortly before the battle, because of this, he missed out on one of the bloodiest battles in the Civil War. Out of all the men Daniel was lucky to avoid getting wounded, captured, or killed. He was lucky to go home after the war and spend time with his family in the green hills of Vermont.…

    • 1423 Words
    • 6 Pages
    Better Essays
  • Good Essays

    So how should an organization or person protect its valuable digital processing infrastructure? A business should establish and implement a comprehensive information assurance plan. Individuals should at least address the components of a professional information assurance plan. Doing so is evidence that the infrastructure owners are attempting to practice due diligence.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Paper on Physical Security

    • 4681 Words
    • 19 Pages

    An important consideration of an information or operating system of a business or organization is to have a security system that protects information, data, and integrity of the company’s sensitive information and records. If a business or company does not have adequate security, financial, sensitive, and classified information may be compromised and prone to possible viruses and malware, hacking, or at risk of a cyber-attack to the company’s data resulting in possible financial loss. If this scenario is the case, extensive resources most likely will be required to repair or undo the damage caused by the breach of security or virus. This essay will discuss the Service Request SR-rm-013 for Riordan Manufacturing and address security issues and concerns. In addition, this document proposes solutions, methods, and options, and provide information that would best suit the company’s needs and requirements for the security and integrity of sensitive data, based on Riordan’s current security, operating system, and database.…

    • 4681 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality.…

    • 2224 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Given a computer network for data transmission, identify and analyze the possibilities for loss or modification of data and demonstrate techniques to safeguard data from loss, modification or improper disclosure during transmission by using encryption, digital signatures, cryptographic seals and time stamp techniques and describe how they provide the elements of secrecy, authenticity, detection of modification and detection of reuse of the transaction data.…

    • 360 Words
    • 2 Pages
    Satisfactory Essays