{"title":"企业环境下基于MPLS的VPN实现","authors":"Farooq Ahmed, Zain Butt, Uzair Siddiqui","doi":"10.4172/2165-7866.1000193","DOIUrl":null,"url":null,"abstract":"Today organizations are spread across the globe due to higher business activities. The network connectivity among the offices at different geographic locations has become a challenge for network professionals. VPN is used to counter this narrative. It has become a popular industry solution in recent years. MPLS is a relatively newer WAN technology providing advantages over other technologies. At the same time, it is compatible with existing technologies like ATM, FR, Ethernet and SONET. VPN having connectivity via MPLS infrastructure is known as MPLS VPN. It offers many advantages over traditional VPN solutions. In this project, MPLS based VPN is implemented in a corporate environment. Three regional offices of an organization are connected with the central site through MPLS based ISP’s network. Hub and spoke topology is implemented in this scenario. The connectivity among the sites is established and forwarding decisions are made on the bases of MPLS labels instead of IP addresses. Furthermore, it is also observable in results that MPLS doesn’t need any other tunneling protocol unlike traditional VPNs. It makes tunnels based on labels. Concerning the security requirements, it hides the customer’s network from ISP’s network, which is discussed in the results section.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"6 1","pages":"1-7"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000193","citationCount":"5","resultStr":"{\"title\":\"MPLS based VPN Implementation in a Corporate Environment\",\"authors\":\"Farooq Ahmed, Zain Butt, Uzair Siddiqui\",\"doi\":\"10.4172/2165-7866.1000193\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today organizations are spread across the globe due to higher business activities. The network connectivity among the offices at different geographic locations has become a challenge for network professionals. VPN is used to counter this narrative. It has become a popular industry solution in recent years. MPLS is a relatively newer WAN technology providing advantages over other technologies. At the same time, it is compatible with existing technologies like ATM, FR, Ethernet and SONET. VPN having connectivity via MPLS infrastructure is known as MPLS VPN. It offers many advantages over traditional VPN solutions. In this project, MPLS based VPN is implemented in a corporate environment. Three regional offices of an organization are connected with the central site through MPLS based ISP’s network. Hub and spoke topology is implemented in this scenario. The connectivity among the sites is established and forwarding decisions are made on the bases of MPLS labels instead of IP addresses. Furthermore, it is also observable in results that MPLS doesn’t need any other tunneling protocol unlike traditional VPNs. It makes tunnels based on labels. Concerning the security requirements, it hides the customer’s network from ISP’s network, which is discussed in the results section.\",\"PeriodicalId\":91908,\"journal\":{\"name\":\"Journal of information technology & software engineering\",\"volume\":\"6 1\",\"pages\":\"1-7\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.4172/2165-7866.1000193\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of information technology & software engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4172/2165-7866.1000193\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of information technology & software engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4172/2165-7866.1000193","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
摘要
今天,由于更高的商业活动,组织遍布全球。不同地理位置的办公室之间的网络连接已经成为网络专业人员面临的挑战。VPN被用来反驳这种说法。近年来,它已成为一种流行的行业解决方案。MPLS是一种相对较新的广域网技术,它比其他技术具有优势。同时,它兼容现有的ATM、FR、以太网和SONET等技术。通过MPLS基础设施连接的VPN称为MPLS VPN。与传统的VPN解决方案相比,它提供了许多优点。本课题在企业环境中实现基于MPLS的VPN。某组织的三个区域办事处通过基于MPLS的ISP网络与中心站点相连。Hub and spoke拓扑在此场景中实现。建立站点间的连通性,根据MPLS标签而不是IP地址进行转发决策。此外,在结果中还可以观察到MPLS不需要任何其他隧道协议,这与传统vpn不同。它根据标签挖隧道。考虑到安全需求,它对ISP的网络隐藏了客户的网络,这在结果部分进行了讨论。
MPLS based VPN Implementation in a Corporate Environment
Today organizations are spread across the globe due to higher business activities. The network connectivity among the offices at different geographic locations has become a challenge for network professionals. VPN is used to counter this narrative. It has become a popular industry solution in recent years. MPLS is a relatively newer WAN technology providing advantages over other technologies. At the same time, it is compatible with existing technologies like ATM, FR, Ethernet and SONET. VPN having connectivity via MPLS infrastructure is known as MPLS VPN. It offers many advantages over traditional VPN solutions. In this project, MPLS based VPN is implemented in a corporate environment. Three regional offices of an organization are connected with the central site through MPLS based ISP’s network. Hub and spoke topology is implemented in this scenario. The connectivity among the sites is established and forwarding decisions are made on the bases of MPLS labels instead of IP addresses. Furthermore, it is also observable in results that MPLS doesn’t need any other tunneling protocol unlike traditional VPNs. It makes tunnels based on labels. Concerning the security requirements, it hides the customer’s network from ISP’s network, which is discussed in the results section.