Analysis Of MPLS VPN Resistance To External Threats

Open access

Abstract

This article presents analysis and possible reactions of MPLS network on unauthorized access and on device’s failure. Five Cisco routers joined into a core network were used to conduct the project. The devices were connected into a classic reliability model with envelope shape. The key aspects of the research were incidents’ simulation in line with previously prepared scenarios as well as diagnosis of network’s reactions to a particular type of a device failure. These effects were modelled using special devices such as analysers and generators of data traffic. Additionally, the range of the project included measuring convergence time of the routing protocols acting inside the network combined with analysis of reactions to forced changes of route.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • [1] De Ghein L. MPLS Fundamentals Cisco Press Indianapolis 2007 ISBN: 1-58705-197-4.

  • [2] Serafin M. Sieci VPN Zdalna praca i bezpieczeństwo danych Helion Gliwice 2008 ISBN: 978-83-246-1521-6.

  • [3] Laskowski D. Lubkowski P.: Confidential transportation of data on the technical state of facilities Advances in Intelligent Systems and Computing 286 pp. 313-324 2014.

  • [4] Bajda A. Laskowski D. Wrazen M.: Diagnostics the quality of data transfer in the management of crisis situation Przeglad Elektrotechniczny 87 (9 A) pp. 72-78 2011.

  • [5] Lubkowski P. Laskowski D.: The end-to-end rate adaptation application for real-time video monitoring Advances in Intelligent Systems and Computing 224 pp. 295-305 2013.

  • [6] Lubkowski P. Laskowski D. Pawlak E. Provision of the reliable video surveillance services in heterogeneous networks Safety and Reliability: Methodology and Applications - Proceedings of the European Safety and Reliability Conference ESREL 2014 pp. 883-888 2015.

  • [7] Laskowski D. Lubkowski P. Pawlak E. Stańczyk P.: Anthropo-technical systems reliability Safety and Reliability: Methodology and Applications - Proceedings of the European Safety and Reliability Conference ESREL 2014 pp. 399-407 2015.

  • [8] Lubkowski P. Laskowski D.: Test of the multimedia services implementation in information and communication networks Advances in Intelligent Systems and Computing 286 pp. 325-332 2014.

  • [9] Kowalski M. Magott J. Nowakowski T. Werbińska-Wojciechowska S.: Exact and approximation methods for dependability assessment of tram systems with time window European Journal of Operational Research 235(3) pp. 671-686 2014.

  • [10] Nowakowski T. Werbińska-Wojciechowska S.: Expert system for means of transport maintenance processes performance: a comparative analysis for various types of rail vehicles. In: Safety and reliability: methodology and applications: proceedings of the European Safety and Reliability Conference ESREL 2014 Wrocław Poland 14-18 September 2014 eds. Tomasz Nowakowski et al. Leiden: CRC Press/Balkema pp. 1217-1225 2015.

  • [11] Siergiejczyk M. Krzykowska K. Rosiński A.: Reliability assessment of cooperation and replacement of surveillance systems in air traffic. In „Proceedings of the Ninth International Conference Dependability and Complex Systems DepCoS-RELCOMEX” editors: Wojciech Zamojski Jacek Mazurkiewicz Jarosław Sugier Tomasz Walkowiak Janusz Kacprzyk given as the monographic publishing series – „Advances in intelligent systems and computing” Vol. 286. pp. 403–411. The publisher: Springer 2014.

  • [12] Siergiejczyk M. Rosiński A. Krzykowska K.: Reliability assessment of supporting satellite system EGNOS. The monograph „New results in dependability and computer systems” editors: Wojciech Zamojski Jacek Mazurkiewicz Jarosław Sugier Tomasz Walkowiak Janusz Kacprzyk given as the monographic publishing series – „Advances in intelligent and soft computing” Vol. 224. pp. 353–364. The publisher: Springer 2013.

  • [13] Lubkowski P. Laskowski D.: The selected issues of reliable identification of object in transport systems using video monitoring services Communication in Computer and Information Science 0471 pp. 59-68 2014.

  • [14] Laskowski D. Lubkowski P. Kwasniewski M.: Identification of suitability services for wireless networks Przeglad Elektrotechniczny 89 (9) pp. 128-132 2013.

  • [15] Bylak M. Laskowski D.: Assessment of network coding mechanism for the network protocol stack 802.15.4/6LoWPAN Advances in Intelligent Systems and Computing 224 pp. 75-82 2013.

  • [16] Bylak M. Laskowski D.: Diagnosis coding efficiency of network coding mechanism for wireless networks Przeglad Elektrotechniczny 89 (9) pp. 133-138 2013.

Search
Journal information
Impact Factor


CiteScore 2018: 0.33

SCImago Journal Rank (SJR) 2018: 0.21
Source Normalized Impact per Paper (SNIP) 2018: 0.434

Metrics
All Time Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 346 184 4
PDF Downloads 188 128 9