Performance Analysis of a Large-Scale Enterprise Network in Real Time Environment

Authors

  • Md. Taslim Arefin  Department of ETE, Daffodil International University, Dhaka, Bangladesh
  • Md. Tauhidunnabi Likhon  Department of ETE, Daffodil International University, Dhaka, Bangladesh
  • Chowdhury Badrul Huda  Department of ETE, Daffodil International University, Dhaka, Bangladesh
  • Diganta Roy   Department of ETE, Daffodil International University, Dhaka, Bangladesh

Keywords:

Enterprise Network, MPLS, VPN, GNS3

Abstract

An enterprise network is a communications backbone that helps to connect computers and other related devices across a large workgroup networks that provides insight and data accessibility. In this paper an enterprise network model has been designed based on real time environment. A comparative analysis of MPLS network over conventional Internet Protocol (IP) network has been performed. Different routing protocols such as OSPF, EIGRP, RIPv1, RIPv2 and MPLS have been considered in the performance analysis. GNS3 has been used to simulate the both networks and the comparative analysis has been made based several parameters such as Packet jitter, Packet delay, Packet drop etc. The simulation results have been analyzed which indicates that MPLS network has performed better than conventional IP network in real-time applications such as Voice and video. MPLS L3 VPN has been used in the proposed model.

References

  1. Hao Yang, Ricciato, F., Songwu Lu, Lixia Zhang; Securing a wireless world Proceedings of the IEEE Volume 94; Feb. 2006
  2. Lucent Technologies; Users Guide for the ORiNOCO Managers Suite; Nov. 2000 12 Wi-Fi Alliance; Wi-Fi Protected Access: Strong, Standard Based, Interoperable Security for todays Wi-Fi Network.
  3. Leinwand, Allan, Bruce Pinsky, and Mark Culpepper. Cisco router configuration. Cisco Press, 1998.
  4. Gurkas, G.Z., Zaim, A.H., Aydin, M.A.;Security Mechanisms And Their Performance Impacts On Wireless Local Area Networks; International Symposium on Computer Networks,2006; June 200
  5. Mentze, Duane, and David McAnaney. "Automatic networking device configuration method for home networking environments."
  6. KeunSoon Lee, HyoJin Kim, JooSeok Song; Lightweight packet authentication in IEEE 802.11; Wireless Telecommunications Symposium, 2005; April, 2005
  7. Manivannan, N., Neelameham, P.;Alternative Pair-wise Key Exchange Protocols (IEEE802.11i) in Wireless LANs; International Conference on Wireless and Mobile Communications, 2006. ICWMC '06; July 2006
  8. Ju-A Lee, Jae-Hyun Kim, Jun-Hee Park, Kyung-Duk Moon; A Secure Wireless LAN Access Technique for Home Network; IEEE 63rd Vehicular Technology Conference, 2006;
  9. Kassab, M., Belghith, A., Bonnin, J., Sassi, S.; Fast pre- authentication based on proactive key distribution for 802.11 infrastructure networks; Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling; 2005
  10. Yurcik, William J. "Network Topologies." Computer Sciences, edited by K. Lee Lerner and Brenda Wilmoth Lerner, 2nd ed., Macmillan Reference USA, 2013.
  11. R. PRODANOVIC, D. SIMIC , Holistic Approach to WEP Protocol in Securing Wireless Network Infrastructure. Com SIS , Vol. 3, No. 2, pp. 97—113, (2006)
  12. A.Haque, K.A.M Lutfullah, M.Zahedul Hassan, M.R.Amin, “Performance Analysis and the Study of the behaviour of MPLS Protocol”
  13. J.Barakovic, A.Husic“QoS design issues and traffic engineering in next generation IP/MPLS network”, june 2007

Downloads

Published

2021-06-30

Issue

Section

Research Articles

How to Cite

[1]
Md. Taslim Arefin, Md. Tauhidunnabi Likhon, Chowdhury Badrul Huda, Diganta Roy , " Performance Analysis of a Large-Scale Enterprise Network in Real Time Environment" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 3, pp.10-16, May-June-2021.