The Design of Multi-Protocol Network Based on Point-to-Point Protocol and Frame Relay

Article Preview

Abstract:

Local area network and wide area network are different network protocols, small and medium enterprises due to the geographical distribution of discrete and interface diversity, leading to its needs to be compatible with different network protocols, it is difficult to use a single network protocol to realize network architecture, and due to the ipv4 address scarcity, making its application or maintenance cost greatly increased, based on this, this paper presents the design of multi-protocol network architecture based on point-to-point protocol and frame relay, and with the advantages of the router is compatible with a variety of interfaces and protocols to connect different network interfaces, the paper also gives the configuration of routing information protocol and static routing through local area network, the paper presents the core information of frame relay and point-to-point protocol among the routers, and the paper gives the realization of the network address translation in the end.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2293-2297

Citation:

Online since:

June 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] China Education and Research Network [EB/OL]. (1993).

Google Scholar

[2] Xinwen Zhang, Formal model and analysis of usage control, Ph.D. thesis, George Mason University, Fairfax, Virginia, (2006): 3-15.

Google Scholar

[3] Rosen E, Rekhter Y. BGP/MPLS IP Virtual Private Networks (VPNs)[S]. RFC 4364, (2006).

DOI: 10.17487/rfc4364

Google Scholar

[4] Label Switching Networks[S]. RFC 3443, (2003).

Google Scholar

[5] Colton A. Cisco IOS for IP Routing. 3rd ed., Rocket Science Press, Inc., (2003).

Google Scholar

[6] Rekhter Y, Li T. RFC1771, ABorder Gateway Protocol 4 (BGP-4) [S], (1995).

Google Scholar

[7] David C. Chou, and Kirill Yuro, Security development in Web Services environment, Computer Standards & Interfaces, (2005): 233-240.

DOI: 10.1016/s0920-5489(04)00099-6

Google Scholar

[8] J. Park, R. Sandhu, The UCONABC usage control model, ACM Transactions on Information and System Security (TISSEC), Vol. 7, No. 1, (2004): 128-174.

Google Scholar