Today, we would like to discuss about the
topology system that is being used by Air Asia’s Computer Reservation System as
well as its hardware, software, and telecommunication system that is involved.
We try to interview several IT specialist in
order to identify and analyze the topology system and the components that is
used to running it. Therefore, the information below is our analyze of Air Asia’s
Computer Reservation System based on our research by interview with the specialist,
literature review, and internet research.
Based on our research, we believe that Air Asia
is implementing Mesh Topology for its Computer Reservation System.
In a mesh network topology, each of the network node, computer and other devices, are interconnected with one another. Every node not only sends its own signals but also relays data from other nodes. In fact a true mesh topology is the one where every node is connected to every other node in the network. This type of topology is very expensive as there are many redundant connections, thus it is not mostly used in computer networks. It is commonly used in wireless networks. Flooding or routing technique is used in mesh topology.
Advantages
1. The use of dedicated link guarantees that each
connection can carry its own data load. It eliminates traffic problem.
2. If one link becomes unusable, it does not harm
the entire system.
3. It is easy to troubleshoot.
Disadvantages
1. A full mesh network can be very expensive.
2. It is difficult to install and reconfigure.
Hardware
and Software:
1. Supercomputer
2. Server with a minimum specification as below:
a. Operating Systems: Win98 / NT / 2000 / XP / Linux
/ Solaris / HP-UX
b. Server: Apache (with ionCube support)
c.
Server Side:
PHP (builds compatible with the standard API)
d. Database: MySQL
Telecommunication
Networks
Multiprotocol
Label Switching-based Virtual Private Network.
"MPLS" and "VPN" are two
different technology types. Multiprotocol Label
Switching (MPLS) is a standards-based technology used to
speed up the delivery of network packets over multiple protocols – such as the
Internet Protocol (IP),
Asynchronous Transport Mode (ATM) and frame relay network protocols.
A virtual private
network (VPN) uses shared public telecom
infrastructure, such as the Internet, to provide secure access to remote
offices and users in a cheaper way than an owned or leased line. VPNs are
secure because they use tunneling protocols and procedures such as Layer Two
Tunneling Protocol (L2TP).
With those definitions understood, an MPLS VPN is a VPN that is built on top of
an MPLS network, usually from a service provider, to deliver connectivity
between enterprise office locations. The terms "MPLS IP VPN,"
"MPLS VPN" and "MPLS-based VPN" can be used synonymously.
Advantages and disadvantages of MPLS VPNs
MPLS VPN advantages
Many MPLS VPNs offer much more flexibility at more cost-effective price-points than other WAN technologies such as T1 lines. The label-switching technology offers QoS and CoS capabilities. Also, keeping your traffic on a single vendor using MPLS VPNs gives the vendor the ability to offer your company service-level agreements (SLAs) for network performance, unlike the "best effort" delivery of the Internet, network consultant Tom Lancaster says.
MPLS VPN disadvantages
Keep in mind that with MPLS VPNs, service providers run the core of your network, which presents several disadvantages:
Many MPLS VPNs offer much more flexibility at more cost-effective price-points than other WAN technologies such as T1 lines. The label-switching technology offers QoS and CoS capabilities. Also, keeping your traffic on a single vendor using MPLS VPNs gives the vendor the ability to offer your company service-level agreements (SLAs) for network performance, unlike the "best effort" delivery of the Internet, network consultant Tom Lancaster says.
MPLS VPN disadvantages
Keep in mind that with MPLS VPNs, service providers run the core of your network, which presents several disadvantages:
·
Your routing protocol choice might be limited.
·
Your end-to-end convergence is controlled primarily by the service
provider.
·
The reliability of your L3 MPLS VPN is influenced by the service
provider's competence level.
Written By Andina F.S
0 comments:
Post a Comment