Javascript must be enabled to continue!
Evaluación de redes MPLS/VPN/BGP con rutas reflejadas
View through CrossRef
En este artículo se realiza el estudio y evaluación de las redes MPLS/VPN/BGP a nivel de Backbone considerando el RFC 4364, sobre ambientes de intranet.El algoritmo BGP se evalúa en escenarios RouteRefl ection para la conexión de los enrutadores CE (CustomerEdge) y PE (ProviderEdge) de la Red MPLS desde el establecimiento de VRF (Virtual Routing and Forwarding) y su rendimiento en la conexión a través de la VPN.
Universidad Distrital Francisco Jose de Caldas
Title: Evaluación de redes MPLS/VPN/BGP con rutas reflejadas
Description:
En este artículo se realiza el estudio y evaluación de las redes MPLS/VPN/BGP a nivel de Backbone considerando el RFC 4364, sobre ambientes de intranet.
El algoritmo BGP se evalúa en escenarios RouteRefl ection para la conexión de los enrutadores CE (CustomerEdge) y PE (ProviderEdge) de la Red MPLS desde el establecimiento de VRF (Virtual Routing and Forwarding) y su rendimiento en la conexión a través de la VPN.
Related Results
Detecting and analyzing border gateway protocol blackholing activity
Detecting and analyzing border gateway protocol blackholing activity
SummaryDDoS attack is a traditional malicious attempt to make an authorized system or service inaccessible. Currently, BGP blackholing is an operational countermeasure that builds ...
Enhanced Fast Rerouting Mechanisms for Protected Traffic in MPLS Networks
Enhanced Fast Rerouting Mechanisms for Protected Traffic in MPLS Networks
Multiprotocol Label Switching (MPLS) fuses the intelligence of routing with the performance of switching and provides significant benefits to networks with a pure IP architecture a...
PERANCANGAN DAN SIMULASI BGP MULTIHOMING MENGGUNAKAN GNS3 DEDI SATRIA 175100009 JARINGAN KOMPUTER
PERANCANGAN DAN SIMULASI BGP MULTIHOMING MENGGUNAKAN GNS3 DEDI SATRIA 175100009 JARINGAN KOMPUTER
AbstractBorder Gateway Protocol atau biasa disebut BGP adalah suatu protokol yang digunakan untuk routing antar autonomous system. Protokol ini dibuat berdasarkan teknologi EGP yan...
Evaluation of routing protocol OSPFv3 on the link PE-CE on MPLS/VPN environments
Evaluation of routing protocol OSPFv3 on the link PE-CE on MPLS/VPN environments
The paper must have abstract. The rapid growth of networks base on IP, and the
current challenge posed by the technological deployment of IPv6 and annexed
applications, challenges ...
Tokenized Flow-Statistics Encrypted Traffic Analysis: Comparative Evaluation of 1D-CNN, BiLSTM, and Transformer on ISCX VPN-nonVPN 2016 (A1+A2, 60 s)
Tokenized Flow-Statistics Encrypted Traffic Analysis: Comparative Evaluation of 1D-CNN, BiLSTM, and Transformer on ISCX VPN-nonVPN 2016 (A1+A2, 60 s)
End-to-end encryption is now the default for major Internet applications, reducing the effectiveness of payload-based deep packet inspection for security monitoring and traffic eng...
Data Center Network Architecture Design for Cloud Computing
Data Center Network Architecture Design for Cloud Computing
In this paper, through the demand analysis of cloud computing data center network, the typical layer 2 Technology (virtual switch technology and tunnel technology) and cloud data c...
Design and Implementation of a Secure WAN Using Site-to-Site VPN: A Practical Comparison with MPLS
Design and Implementation of a Secure WAN Using Site-to-Site VPN: A Practical Comparison with MPLS
This study presents a technical implementation and comparative analysis of a multi-site Wide Area Network (WAN) architecture connecting a central Headquarters (HQ) in Tripoli to th...
Implementation of IPv6 Internet Service with MPLS Networks and MPLSL3VPN Service in IPv6 Networks
Implementation of IPv6 Internet Service with MPLS Networks and MPLSL3VPN Service in IPv6 Networks
Exchanging the data packets seems as very challenging task due to exponential growth in network interface. Meanwhile, this increased interface makes use of next generation of inter...

