StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Outstanding Networks Relative to Traditional IP Networks - Assignment Example

Cite this document
Summary
The paper 'The Outstanding Networks Relative to Traditional IP Networks' presents availing an efficient framework for decision-makers in selecting the interior gateway protocol for MPLS VPN backbone networks. The aim is sufficiently stated in the study and makes a reader get a glance…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.9% of users find it useful
The Outstanding Networks Relative to Traditional IP Networks
Read Text Preview

Extract of sample "The Outstanding Networks Relative to Traditional IP Networks"

Research Skills and Principles Research Skills and Principles The Overall Aims and the Research Question The study aims at availing an efficient framework for decision makers in selecting the interior gateway protocol for MPLS VPN backbone networks. The aim is sufficiently stated in the study and makes a reader get a glance insight of what the paper entail. The aim will hence guide the researcher to remain within the topic and deliver a satisfactory understanding of the service provider enormous networks management operation. In addition, that aim is precise and will help the researcher solely focus on the MPLS VPN technology. Question How can MPLS VPN backbone be modelled to solve the shortcomings associated with Traditional IP-based networks, ATM networks and Frame Relay in the management of enormously large networks like scalability flexibility, security, and cost?. Such a question is sufficient and in line with the aim of the study. It is effective to help the researchers study the impacts of the interior gateway routing protocols in the MPLS VPN. The Approach Employed The approach employed in the study is sufficient and closely linked to the study question and objectives. Such an approach helped the researchers to investigate and validate their new proposed design. The authors proposed a new design that merged both features of layer three such as intelligence and scalability with those of layer two such as simplicity and efficiency culminating into MPLS/BGPVPNS design. The authors first conducted a thorough literature review on the related topic. This was of great benefit as it provided the bedrock for the study. The review of the literature helped the authors to get valuable insights into the current problem the system has and thus need for alternative. The reviewed literature in the MPLS, VPN, and MPLS VPN technology presented the best opportunity for gathering the information for a satisfactory fathoming of linked concepts to the current study. Subsequently, the authors did awesome work by indulging into an in-depth deliberation on various routine concepts. Such a discussion availed the avenue critically to investigate the effects of interior gateways routing protocol. Moreover, the authors should be lauded because they gave specifications of the twin routing protocol for the present study. The two simulation approach employed were appropriate and in line with the study questions and objectives. The simulation help to probe the two design separately to make a rational decision. This was necessary to gauge the merits and demerits of each design which would later inform the investigators of the most appealing design to implement. The use of OPNET simulation approach was lauded as it gave a precise understanding of the behavior of the MPLS VPN networks with respect to the selected interior gateway protocol (OSPF or IS-IS). Indeed, the two gateway protocol was much beneficial in probing the behavior of the MPLS VPN networks. The use of the two OPNET simulation scenarios with the first design involving Medium Service provided and Large Service provider MPLS VPN was a rational approach. In fact, the study would be shuttered if only one Large MPLS VPN were to be studied without the control, the medium MPLS VPN. Further, the double implementation of each OPNET simulation scenario per design in accordance with IGP was appropriate to present accuracy and true observations. A single implementation would be disastrous since there could have been errors or constraints in the initial simulation. Therefore, implantation both with respect to OSPF and IS-IS gave the researchers an opportunity to decide the feasibility of OSPF or IS-IS based on their respective results. In addition, the weakness of one implementation criteria would be balance by the author either in the first implementation or the second one to avail the valid findings. The application of both VPN and MLS routers configuration were called for in this study. The proper demonstration of each configuration was relevant to the study to weed out any chances of errors made in the conclusion that might have been attached to extraneous variables like improper configuration. Finally, the test parameters employed in the study were sufficient to avail the rational and unbiased IGP protocol judgment. In essence, the test parameters were in line with the objectives of the study as well as the study question which would otherwise be shuttered as the best IGP would make MPLS VPN networks successfully. In addition, the test parameters adequately assisted in the demonstrating the effects of IGP in MPLS VPN networks. Thus, distinguishing the test parameters to those connected to the protocol itself and those linked solely to VPN precisely aided in drawing the best conclusion for the study. The Tools and Techniques used The employment of the OPNET modeler as a simulation tool provided a satisfactory avenue for the individual design simulation technique. The OPNET greatly contributed to the study as it was the bedrock upon which the entire study was shaped. In essence, the two scenarios that gave the green light to the subsequent network analyses were embedded in the use of OPNET tool. Indeed, analyses that informed the ultimate rational decision rested on this tool or model (Pepelnjak, Guichard & Apcar, 2003). In addition, the use of such experimental design tool in ROSS was sufficiently appropriate to analyze the interaction between OSPF and BGP with respect to a large scale networks. The application of the Rocket fuel data repository was adequate in helping the authors to design a realistic large-scale simulation based on inter- and intra-domain routings protocol. Such a technique was an inevitability in this study as it aided in the provision of an avenue to compare the first and the second design that further collapsed into data for analyses. The Outcome and Findings, Including the Relationship to Your Own Proposed Research The outcome and findings of the study gave an answer to the questions and met the objectives of the study. The objective was to provide an evidence-based or research-based framework upon which right decision could be reached in selecting the interior gateway protocol for MPLS VPN backbone network. Indeed, the outcome and findings gave this framework. Accordingly, the simulation results strongly pointed that MPLS VPN delivers the outstanding networks relative to traditional IP networks. Such a strong conviction is in line with the study objective. In addition, from the twin case studies analyzed, it is critical to note that both protocols, OSPF, and IS-IS were effective as revealed by the two OPNET modeler. However, IS-IS indicated sufficient results when analyzed on the basis of delay since packets are encapsulated in link layer frames directly but in OSPF, the encapsulation of packets is diagram-based. Further, IS-IS showed speed in convergence time relative to OSPF. Moreover, IS-IS offered the capability to design large networks by establishing a single larger Level 1 with no hierarchies in IS-IS involved. Such ability cannot be met by OSPF. However, the analysis indicated that both protocols warrant multiple instances, multi-topology, and traffic engineering. Further, IS-IS allows ‘Single Topology’ mode used with IPv6 routing hence IPv4 and IPv6 network both work with one SPF calculation (Sarah & Suhail, 2013). Therefore, there is a simplification and minimization of resource requirement to operate both protocols simultaneously. However, for OSPF to warrant IPv4 and IPv6, there is a separate configuration of OSPFv2 and OSPFv3. The functionality of OSPF routing protocol is sufficient in MPLS VPN with conventional outcomes. However, IS-IS is still advantageous culminating to its persistent application by service providers engineers. Therefore, critically the findings are in line with the objectives and equip the decision makers as they wander on choosing the interior gateway protocols. The outcomes and findings are satisfactory, and thus decision makers have a research-based framework to help them settle on the interior gateway protocol based on the degree of requirement. Reference Sarah, M. E & Suhail B, A, (2013). Effects of the Interior Gateway Routing Protocols in the Multiprotocol Label Switching Networks. A Simulated Comparison between IS-IS and OSPF Routing Protocols. Pepelnjak, J. Guichard, and J. Apcar, (2003). MPLS and VPN Architectures, CCIE edition, US Cisco Press. Mohammad JunaidArshad , Tauqir Ahmad, AmjadFarooq. (2010). "Data Networks’ Design and Optimization through MPLS VPNs using BGP",Journal of American Science. Santiago Al varez,” (2006). QoS for IP/MPLS Networks”, Cisco Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Research Skills and Principles Assignment Example | Topics and Well Written Essays - 1250 words”, n.d.)
Research Skills and Principles Assignment Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1685764-research-skills-and-principles
(Research Skills and Principles Assignment Example | Topics and Well Written Essays - 1250 Words)
Research Skills and Principles Assignment Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1685764-research-skills-and-principles.
“Research Skills and Principles Assignment Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1685764-research-skills-and-principles.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Outstanding Networks Relative to Traditional IP Networks

How does technology affects literacy(ies)

These days, wireless networks are being readily installed in the educational institutions.... 26 November 2012.... How technology affects literacy: the use of Wi-Fi technology in schools Introduction There is great deal of difference between literacy in the twenty-first century and in any century preceding it....
3 Pages (750 words) Essay

Quality of service for VoIP

Voice over IP the broadcast of voice over packet-switched ip networks is one of the mainly significant up-and-coming trends in telecommunications.... According to the expert analysis new advances in networking technology, counting fast Ethernet, wire-speed switching and Policy-Based Quality of Service management, have complete it probable to build converge voice and data networks.... According to the expert report that converged networks decrease costs by get rid of superfluous hardware, communications facilities and sustain staffs....
14 Pages (3500 words) Dissertation

Security - Network Design

This requires networks to connect various information centres for transfer of this information.... This Data is often sensitive, personal, private and valuable in financial terms.... Any misuse or fraud will render the owner of the.... ... ... Network security has assumed paramount proportions as intrusions are on the rise, whether accidental or malicious, and the research problem raised in the paper are to investigate the preventive methods in this Literature Review reveals that there is more to security than just putting up defences....
54 Pages (13500 words) Essay

Executive Report to the CFO

This paper ''Executive Report to the CFO'' tells us that Sprint Nextel Corporation (Sprint) is a communication company that operates in two segments: Wireless and Wireline.... In the United States, Sprint is the third-largest wireless carrier company after Verizon and AT&T.... It serves about 55 million customers with mobile voice, data etc....
19 Pages (4750 words) Research Paper

The Use of Policy-Based Network Management

The paper "The Use of Policy-Based Network Management" highlights that network management market has developed over time with the growth of software and hardware resolutions that has facilitated administrators to sustain and follow the status of enterprise networks.... Though, networks have turned out to be further heterogeneous and multifaceted that are gradually mission-critical.... Strategies which are a follow-on from the objectives of management describe the preferred performance of distributed heterogeneous networks and systems, and state means to implement this conduct....
9 Pages (2250 words) Research Paper

4th Generation Based on IMT-Advanced

The third-generation technologies were more or less advancement of the 2nd generation technologies, operating in nearly the same spectrum and same frequency range with relative developments and advancements in the different areas, therefore it was imperative to bring about a technological standard that is relatively wider in operations, more accommodating and makes use of the different and bigger frequency bands in the form of Gigabit band....
11 Pages (2750 words) Coursework

Intellectual Property Rights and the Regulation of Culture

This immaterial labor composes collective forms that exist as networks and flows.... hese cycles of production occur in capitalist and dissolve back into the flows and networks to promote enrichment and reproduction of productive capacities (Krysa, 2006).... According to the following paper, the theory of immaterial labor refers to different aspects of labor....
14 Pages (3500 words) Coursework

Analysis of Voice over Internet Protocol - Security Issues and Solutions

The research has shown that various effective solutions can be implemented to ensure the security and privacy of communication carried out through VoIP networks however the implementation of these security solutions can require extra resources and can take additional processing time.... Before we go into the detail of security issues and challenges faced by people while using or through this technology it is necessary to understand the basics of VoIP networks....
19 Pages (4750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us