Hope is what makes us strong. It is why we are here. It's what we fight with when all else is lost.

Sunday, 3 May 2015

9th Week : Topology system and IT Component of Air Asia's Computer Reservation Systems

Sunday, May 03, 2015 Posted by Unknown No comments
Today, we would like to discuss about the topology system that is being used by Air Asia’s Computer Reservation System as well as its hardware, software, and telecommunication system that is involved.
We try to interview several IT specialist in order to identify and analyze the topology system and the components that is used to running it. Therefore, the information below is our analyze of Air Asia’s Computer Reservation System based on our research by interview with the specialist, literature review, and internet research.

Based on our research, we believe that Air Asia is implementing Mesh Topology for its Computer Reservation System.




In a mesh 
network topology, each of the network node, computer and other devices, are interconnected with one another. Every node not only sends its own signals but also relays data from other nodes. In fact a true mesh topology is the one where every node is connected to every other node in the network. This type of topology is very expensive as there are many redundant connections, thus it is not mostly used in computer networks. It is commonly used in wireless networks. Flooding or routing technique is used in mesh topology. 
Advantages
1.     The use of dedicated link guarantees that each connection can carry its own data load. It eliminates traffic problem.
2.     If one link becomes unusable, it does not harm the entire system.
3.     It is easy to troubleshoot.
Disadvantages
1.     A full mesh network can be very expensive.
2.     It is difficult to install and reconfigure.

Hardware and Software:
1.     Supercomputer
2.     Server with a minimum specification as below:
a.     Operating Systems: Win98 / NT / 2000 / XP / Linux / Solaris / HP-UX
b.     Server: Apache (with ionCube support)
c.      Server Side: PHP (builds compatible with the standard API)
d.     Database: MySQL

Telecommunication Networks
Multiprotocol Label Switching-based Virtual Private Network.
"MPLS" and "VPN" are two different technology types. Multiprotocol Label Switching (MPLS) is a standards-based technology used to speed up the delivery of network packets over multiple protocols – such as the Internet Protocol (IP), Asynchronous Transport Mode (ATM) and frame relay network protocols. A virtual private network (VPN) uses shared public telecom infrastructure, such as the Internet, to provide secure access to remote offices and users in a cheaper way than an owned or leased line. VPNs are secure because they use tunneling protocols and procedures such as Layer Two Tunneling Protocol (L2TP). With those definitions understood, an MPLS VPN is a VPN that is built on top of an MPLS network, usually from a service provider, to deliver connectivity between enterprise office locations. The terms "MPLS IP VPN," "MPLS VPN" and "MPLS-based VPN" can be used synonymously. 
Advantages and disadvantages of MPLS VPNs
MPLS VPN advantages

Many MPLS VPNs offer much more flexibility at more cost-effective price-points than other WAN technologies such as T1 lines. The label-switching technology offers QoS and CoS capabilities. Also, keeping your traffic on a single vendor using MPLS VPNs gives the vendor the ability to offer your company service-level agreements (SLAs) for network performance, unlike the "best effort" delivery of the Internet, network consultant Tom Lancaster says.

MPLS VPN disadvantages

Keep in mind that with MPLS VPNs, service providers run the core of your network, which presents several disadvantages:
·         Your routing protocol choice might be limited.
·         Your end-to-end convergence is controlled primarily by the service provider.
·         The reliability of your L3 MPLS VPN is influenced by the service provider's competence level.


Written By Andina F.S

0 comments:

Post a Comment