A Comparative Analysis of Packet Fragmentation with MPLS Unicast IP Routing and OSPF in an IP-based Network
Charles N. “ A Comparative Simulation Study of IP, MPLS, MPLS-TE for Latency and Packet Loss Reduction over a WAN,” International Journal of Networks and Communications, vol. 6, no.1, pp.1-7, 2016.
Ab Rahman R, Alias FA, Kassim M, Yusof MI, Hashim H.,“Implementation of high availability concept based on traffic segregation over MPLS-TE,” ARPN Journal of Engineering and Applied Sciences, vol. 10, no. 3, pp.1295-301, 2015.
Ab Rahman R, Kassim M, Ariffin N. “Performance Analysis on Wan Optimizations: Bandwidth Management in Multi Protocol Level Switching (MPLS) VirtualPrivate Network (VPN),” 2011 International Conference on Future Information Technology, PCSIT ,vol.13, 2011.
Barakovic J, Bajric H, Husic , “A. Multimedia Traffic Analysis of MPLS and non-MPLS Network,”, Institute of Electrical & Electronics Engineers (IEEE) Proceedings ELMAR, 2006.
Köhler S, Binzenhöfer, “A. MPLS traffic engineering in OSPF networks- A combined approach,”, Teletraffic Science and Engineering: Elsevier BV, pp. 21-30, 2003.
Rahman MA, Hassan Z, Kabir AH, Lutfullah KAM, Amin MR. “Performance Analysis of MPLS Protocols over conventional Network,”, 2008 China-Japan Joint Microwave Conference. Institute of Electrical & Electronics Engineers (IEEE), 2008.
Jaron A, Mihailovic A, Aghvami A., “QoS-Aware Multi-Plane Routing Method For OSPF-based IP Access Networks,”, Computer Networks, 2016.
Sllame AM. “Modeling and simulating MPLS networks,” The 2014 International Symposium on Networks, Computers and Communications. Institute of Electrical & Electronics Engineers (IEEE), 2014.
Nadeau TD. “The MPLS Traffic Engineering MIB (MPLS-TE MIB),”MPLS Network Management: Elsevier BV. pp. 297-366, 2003.
Porwal MK, Yadav A, Charhate SV., “Traffic Analysis of MPLS and Non MPLS Network including MPLS Signaling Protocols and Traffic Distribution in OSPF and MPLS,” 2008 First International Conference on Emerging Trends in Engineering and Technology: Institute of Electrical & Electronics Engineers (IEEE), 2008.
Systems C. “Implementing AAA Authentication,” Securing and Controlling Cisco Routers: Informa UK Limited, 2002.
WANG Y, WANG J. “Use gns3 to simulate network laboratory,”Computer Programming Skills & Maintenance, pp.12:046, 2010.
Faxun L. “The Application of GNS3 in Network Experiments,”Computer & Telecommunication, pp.10:032, 2010.
Ruest N, Ruest D. “Virtualization, A Beginner's Guide,” McGraw-Hill, Inc., 2009.
Shimonski R., The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic: Newnes, 2013.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.