-
Design And Develop Network Storage Virtualization By Using GNS3
Authors:
Abdul Ahad Abro,
Ufaque Shaikh
Abstract:
Virtualization is an emerging and optimistic prospect in the IT industry. Its impact has a footprint widely in digital infrastructure. Many innovativeness sectors utilized the concept of virtualization to reduce the cost of frameworks. In this paper, we have designed and developed storage virtualization for physical functional solutions. It is an auspicious type of virtualization that is accessibl…
▽ More
Virtualization is an emerging and optimistic prospect in the IT industry. Its impact has a footprint widely in digital infrastructure. Many innovativeness sectors utilized the concept of virtualization to reduce the cost of frameworks. In this paper, we have designed and developed storage virtualization for physical functional solutions. It is an auspicious type of virtualization that is accessible, secure, scalable, and manageable. In the paper, we have proposed the pool storage method used the RAID-Z file system with the ZFS model which provides the duplication of site approach, compression blueprint, adequate backup methods, expansion in error-correcting techniques, and tested procedure on the real-time network location. Therefore, this study provides useful guidelines to design and develop optimized storage virtualization.
△ Less
Submitted 24 June, 2020;
originally announced June 2020.
-
Modelling Evaluation of MPLS using Physical and virtual Network on GNS3
Authors:
Abdul Ahad Abro,
Abdul Basit Abro,
Mehvish Abro,
Asad Aslam Siddique
Abstract:
The Multi-Protocol Label Switching (MPLS) is an emerging technology which have quality, effectiveness and administration quality. On the contrary, traditional network inside part passage steering conventions ruin the viable acknowledgment of modern activity designing approaches in legacy IP systems. Virtualization of the network could easily be assuring the network performance and virtual network…
▽ More
The Multi-Protocol Label Switching (MPLS) is an emerging technology which have quality, effectiveness and administration quality. On the contrary, traditional network inside part passage steering conventions ruin the viable acknowledgment of modern activity designing approaches in legacy IP systems. Virtualization of the network could easily be assuring the network performance and virtual network are logically connected with one physical machine so that data could easily be send and get information from one virtual machine to the next machine. The purpose of this Paper is to analyse the traffic of MPLS using physical and virtual networks. This Paper will show that MPLS could also be run on physical and virtual networks. MPLS is running nowadays to provide local area network speed into the wide area Network.
△ Less
Submitted 18 April, 2018;
originally announced April 2018.
-
Secure Network in Business-to-Business application by using Access Control List (ACL) and Service Level Agreement (SLA)
Authors:
Abdul Ahad Abro,
Safeeullah Soomro,
Zainab Alansari,
Mohammad Riyaz Belgaum,
Abdul Baqi Khan Khakwani
Abstract:
The motivation behind this paper is to dissecting the secure network for Business to Business (B2B) application by Implementing Access Control List (ACL) and Service Level Agreement (SLA). This data provides the nature of attacks reported as external or internal attacks. This paper presents the initial finding of attacks, types of attacks and their ratio within specific time. It demonstrates the a…
▽ More
The motivation behind this paper is to dissecting the secure network for Business to Business (B2B) application by Implementing Access Control List (ACL) and Service Level Agreement (SLA). This data provides the nature of attacks reported as external or internal attacks. This paper presents the initial finding of attacks, types of attacks and their ratio within specific time. It demonstrates the advance technique and methodology to reduce the attacks and vulnerabilities and minimize the ratio of attacks to the networks and application and keep the network secure and runs application smoothly regarding that. It also identifies the location of attacks, the reason behind the attack and the technique used in attacking. The whole field of system security is limitless and in an evolutionary stage. To comprehend the exploration being performed today, foundation learning of the web and assaults, the security is vital and in this way they are investigated. It provides the statistical analytics about various attacks and nature of attacks for acquiring the results through simulation to prove the hypothesis.
△ Less
Submitted 22 December, 2016;
originally announced December 2016.