Campus Area Networks of the University using MPLS, VLANs and the Internet
Journal: International Journal of Trend in Scientific Research and Development (Vol.3, No. 5)Publication Date: 2019-15-8
Authors : Khin Aye Thu Soe Soe Mon Thida Soe;
Page : 1467-1470
Keywords : Computer Network; MPLS; IP; VLAN; broadcast domain and Ethernet;
Abstract
Multiprotocol Label Switching MPLS primarily implements and uses labels for making routing decisions. The label based switching mechanism enables the network packets to flow on any protocol. MPLS operates by assigning a unique label or identifier to each network packet. The label consists of the routing table information, such as the destination IP address, bandwidth and other factors as well as source IP and socket information. The router can refer only to the label to make the routing decision rather than looking into the packet. A VLAN virtual LAN abstracts the idea of the local area network LAN by providing data link connectivity for a subnet. One or more network switches may support multiple, independent VLANs, creating Layer 2 data link implementations of subnets. A VLAN is associated with a broadcast domain. It is usually composed of one or more Ethernet switches. Khin Aye Thu | Soe Soe Mon | Thida Soe "Campus Area Networks of the University using MPLS, VLANs and the Internet" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26651.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-network/26651/campus-area-networks-of-the-university-using-mpls-vlans-and-the-internet/khin-aye-thu
Other Latest Articles
- Improving Energy Efficiency and Impairing Environmental Impacts on Cloud Centers by Transforming Virtual Machine into Self-Adaptive Resource Container
- Design of Active Filter for Reducing Harmonic Distortion in Distribution Network
- Study of Myanmar Language Research and Its Impact
- An Investigation of Fault Tolerance Techniques in Cloud Computing
- A Study of SHA Algorithm in Cryptography
Last modified: 2019-09-09 15:02:04