Consider a University connecting to a large ISP; significant volumes of traffic
ID: 3891726 • Letter: C
Question
Consider a University connecting to a large ISP; significant volumes of traffic are originating from other customers as well as the University and are traversing the ISP’s network with end-points managed by different ISPs.
• Describe the techniques that the University can implement to ensure that its traffic receives highest priority under all circumstances.
• If MPLS-TE traffic is traversing the network, describe how the traffic flow and signalling differs from a non-MPLS network and what happens to the traffic if MPLS-TE is not honoured.
• Describe how peering agreements are implemented in an MPLS network
• Describe the operation of an L3 VPN and compare it to the operation of an MPLS tunnel
Explanation / Answer
Solution
a)
MPLS-TE (Multi protocol label switching traffic engineering) can be used to receive highest priority in a bandwidth provided bu an ISP.
The MPLS allows to differentiate the services provided by a network and thus the priority can be obtained in the network or the cyber attacks can be defended to an extent.
The usage of VPN is also enabled to get priority in a network, using the VPN a virtual network can be developed, thus the bandwidth will be allocated for the users. Thus it enables to get the priority in the network and using a virtually dedicated channel, the cyber attacks can also be reduced.
b)
If the MPLS-TE incorporated in a network the traffic flow can be categorized to various users, even though no physical allocation is there a virtual allocation will be established through MPLS.
The performance of layer-2 switching and layer-3 routing scalability is used to develop a robust network.
More reliable network enables more congestion free traffic flow.
The existing network capabilities are used to establish the MPLS TE also, thus if MPLS-TE is not honored, then the network reliability will be reduced, since the network failure can be occured.
c)
Peering agreements allows using other ISP bandwidth.
Thus mixing of various ISP packets will reduce the security of the packet, since the network changes are required to make such an agreement.
Sending packets through a populated or rushed network will result in packet loss and this will enhance the attacks, thus cyber security will be under threat.
d)
The L3 VPN uses an encryption and encapsulation while send through the networks.
Thus the IP packet used in L3_VPN is well encapsulated and encrypted.
The labelling technology is used in the MPLS-TE technology, this produces the difference used by the two technologies.
Feel free to reach out regarding any queries . And please do rate the answer . Thank you .
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.