IJISC
  • Indexed in

  • Latest News

    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 28, 2023
    Volume 12, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Security Technologies Implemented in MPLS VPN Networks


    Author(s): BĂNUȚĂ, Bogdan Alexandru

    Quick view | Full article | Citations | Views: 2,090


    Author(s) keywords: , , ,


    Reference keywords: ,


    Abstract:

    MPLS VPN is a family of methods for harnessing the power of multiprotocol label switching (MPLS) to create virtual private networks (VPNs). MPLS VPNs give network engineers the flexibility to transport and route several types of network traffic using the technologies of a MPLS backbone. This paper provides a method to implement architecture for a secure MPLS VPN network.



    References:

    [1]. Andrew Tanenbaum, “Reţele de calculatoare”, Editura Byblos, ediţia a IV-a, 2003;

    [2]. Adrian Munteanu, “Reţele locale de calculatoare. Proiectare şi administrare”, Editura Polirom, 2003;

    [3]. Larry Peterson, “Reţele de calculatoare: O abordare sistematică”, Editura All, 2001;

    [4]. Peter Norton, “Reţele de calculatoare”, Editura Teora, 2001;

    [5]. Stuart McClure, “Securitatea reţelelor”, Editura Teora, 2002;

    [6]. Tim Parker, “TCP/IP”, Editura Teora, 2002;

    [7]. Ellison R., Linger R., Longstaff T., Mead N., “Case Study in Survivable Network System Analysis”, Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2002;

    [8]. Nancy R. Mead, “Requirements Engineering for Survivable Systems”, Technical Note CMU/SEI-2003-TN-013, 2003;

    [9]. R. Ellison, D. Fisher, R. C. Linger, H. F. Lipson, T. Longstaff, and N. Mead, “Survivable Network Systems: An Emerging Discipline”, Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 1999;

    [10]. R. Kazman, M. Klein, M. Barbacci, T. Longstaff, H. F. Lipson, and S. J. Carriere, “The Architecture Tradeoff Analysis Method”, Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, August 1998, Monterey, CA, IEEE Computer Society;

    [11]. Nancy R. Mead, Robert J. Ellison, Richard C. Linger, Thomas Longstaff, John McHugh, “Survivable Network Analysis”, Pittsburgh, PA 15213-3890: Software Engineering Institute, Carnegie Mellon University, 2000.



    Additional Information

    English title: Security Technologies Implemented in MPLS VPN Networks
    Original title: Tehnologii de securitate implementate în rețele MPLS VPN
    Author(s): BĂNUȚĂ, Bogdan Alexandru
    Article Language: Romanian
    Date of Publication: 2012-12-21
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2012.02.01
    Issue: Volume 1, Issue 2, Year 2012
    Section: Advances in Information Security Research
    Page Range: 9-16 (8 pages)



    Copyright ©2012-2024
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.