High-speed Encryption from Crypto AG: Secure Communication via Broadband Networks

Size: px
Start display at page:

Download "High-speed Encryption from Crypto AG: Secure Communication via Broadband Networks"

Transcription

1 High-speed Encryption from Crypto AG: Secure Communication via Broadband Networks NETWORK SECURITY Solutions

2 Digital age: concentrated data flows All industries depend on being able to transmit and receive data reliably and at ever faster speeds. Easy and, in particular, fast access to information is a major performance criterion in today s communication and knowledge-based society. Data highways form the backbone for all communication. With thousands of broadband connections established around the world every day and the mobile communication market growing unabated, the demand for transmission capacity and higher data rates is naturally growing by leaps and bounds. For example, every laptop or PDA can now communicate over broadband thanks to W-LAN. Also contributing to the broadband boom are professional applications such as the transmission of business conferences by video, the transfer of radar pictures or e-government systems. All these applications generate a flood of data that ultimately has to be carried over the core network. What does that mean for you as a user? In broadband data transmission, data generally leave the protected area of the IT infrastructure, e.g. the computing centre of a government ministry, the floor where a diplomatic mission is located, the command post of an army unit or the command centre of a naval base. From this access point, your data is transported unprotected through the core network (Wide Area Network WAN), because transmission capacity and speed are the top priorities in that network. In other words, core networks, which are typically routed over public land, are designed first for transfer speed and only secondarily for confidentiality. 2

3 completely new magnitudes of risk Information security impacts the entire society in our information age. Networking is growing at an almost explosive pace among public authorities and in the business world. A central concern is that the entire society has become dependent on what are known as critical national infrastructures as a result. These infrastructures are tangible and IT facilities, networks, services and assets of such importance that disturbances in them have grave ramifications for the health, security or well-being of citizens and the efficient operation of a country s government. They are inherently insecure for technical reasons and also because they are prime targets for attacks. Moreover, all transmission technologies, including fibre optic links, are easy to tap. Realistically, a risk profile should also include potential internal organisational risks such as incorrect operation, misuse, negligence and an underestimation of risks. However, the information circulating in the networks of presidential offices, government ministries, defence and police organisations or big businesses is highly sensitive. Items of information in this environment qualify as valuables and the risks they are subject to are correspondingly large. Information security in the use of broadband communication is existentially important! Information transferred over broadband networks has to be protected against unauthorised access. There is only one reliable way of doing so, namely to encrypt all transmitted data. It is important that the quality of transmission should not be impaired in any way in the process. 3

4 Metro Ethernet N The world of broadband communication SatCom SONET/SDH Network Leased Line Fibre Optic Network DSL

5 Copper cable (DSL, Leased Line) Copper is the classic medium for transmitting voice and data information. Copper cables also connect users who are far apart geographically. As leased lines, they establish fixed connections yet are virtually routed over public provider networks. Copper is a tried and tested medium of transmission, easy to lay, reliable and cost-effective in operation. etwork Microwave PDH Network Fibre optic cable Optical fibre transmits optically coded signals using coherent light. In other words, electrical signals have to be converted to optical ones prior to transmission. Each fibre can achieve an enormous transmission bandwidth if light is used simultaneously with different wavelengths (wavelength multiplexers (WDM)). Optical fibre is also immune to electromagnetic pulses. Microwave Microwave links are especially suitable for communication in difficult terrain (mountains, deserts). As a medium requiring no rights-of-way over land and minimal maintenance costs, microwave is quickly available and costeffective and offers a relatively large bandwidth. Microwave stations are easy to transport and can quickly be put into operation in open terrain or on buildings, e.g. for local events (conferences, crisis management, etc.) or for tactical missions being carried out by the armed forces. Fibre Channel Storage Area Storage Area Network Network Satellite links (SatCom) Satellite links can be established with one or several sequential links over any distance. They are an efficient solution either for stationary applications (e.g. over difficult terrain) or for temporary deployment at sites without adequate infrastructure. Satellites today have achieved practically complete geographic coverage and very high technical availability. Widespread technologies/protocols Ethernet: Originally created for local networks, this protocol was further developed and can now be used in global networks for endto-end data transmission (multipoint included). SONET/SDH: SDH ( Synchronous Digital Hierarchy ) is ideal for the high-speed transport of large volumes of data, usually over optical fibre networks. Its tight synchronisation of the rates of transport makes for easy management (extraction and insertion) of the data flows and a high quality of service. PDH: PDH ( Plesiochronous Digital Hierarchy ) has been used for years as a tried and tested transport protocol for medium-range performance. Fibre Channel (FC): Given the threats facing the world today, there is no choice but to transfer important data to decentralised data stores. FC is a modern protocol developed especially for storage area networks (SANs) to provide high-performance point-to-point links. These links typically connect a computing centre with a disaster-recovery computing centre or backup computing centre.

6 Secure broadband communication simple, reliable and maintenance-free Network providers offer a choice of several transport protocols and practically any scalable performance ranges to meet the highly individual needs of users. Each technology has its own strengths and meets different needs. Broadband communication is based on the transport media optic fibre, microwave, copper and satellite links. Crypto AG provides security solutions for all common network technologies, protocols and bandwidths. All of these solutions have two traits in common: they guarantee maximum security and they do not impair transport performances (of up to 10 gigabits per second). Ethernet Encryption The Ethernet standard plays a key role in end-to-end networking. Ethernet is frequently the protocol of choice whether data is transported in a local network (LAN), over optical fibre rings in a metropolitan network (MAN) or over long distances in a wide area network (WAN). Ethernet, once a local data transport technology, is now being applied to the whole range of applications from LAN to WAN without a change of protocol. This trend is evident today in the broad, interoperable product portfolio of everything from PC cards to network components from many manufacturers of Ethernet solutions. With this broad pool of expertise, it is much easier for users to optimise their use of network services by prioritising individual services and to set up operations that are more efficient. SONET/SDH Encryption Logical links are set up between network subscribers in a SONET/SDH network consisting of intermeshed nodes. Bit rates are internationally standardised, facilitating the transport of the most diverse mix of applications (voice, data, and video) over a central, end-to-end network, even nation-wide. SONET/SDH networks also have many advantages as regards error detection and differentiated error reporting. Network management is simple, centralised and semi-automated (according to specified criteria). That means the quality of service (QoS) can be geared to the needs of the specific user. If a network node or optical fibre fails, SONET/SDH network components can automatically reroute the data flows in a few milliseconds to a parallel path without impairing the functionality of the applications. Fibre Channel Encryption Fibre Channel is a transport protocol for large data quantities featuring speeds of 1, 2, 4, 8 and more gigabits per second. It is used primarily in storage area networks (SANs). Fibre Channel Encryption involves the encryption of point-to-point optical fibre links from the computing centre to the disaster-recovery or backup computing centre. They profit from data 6

7 transfer in real time (full wire speed) with maximum security. PDH Encryption PDH ( Plesiochronous Digital Hierarchy ) is a classic, standardised technique for the transmission and multiplexing of data. PDH can be used in connection with common transport technologies, e.g. copper lines, microwave links or satellite links. E1 (2 Mbps) and E3 (34 Mbps) are the most common transmission rates. Crypto AG has had PDH encryption solutions on offer for years and will continue to carry this technology in the future. High-security encryption up to a performance range of 10 gigabits per second: Ethernet Encryption, SONET/SDH Encryption, Fibre Channel Encryption. 7

8 Tailor-made system for each range of application The portfolio of Network Security Solutions from Crypto AG covers systems for all common media, network technologies and transport protocols. They are staggered in terms of performance range so that the suitable version can be selected for every specific need. With the purchase of a system, each customer receives its own secret algorithm, which the customer can change at any time and thus nationalise. Encryption is conducted in protected hardware modules fully shielded from the public network. As a result, the security data are never vulnerable to attack. Moreover, the encryption processes utilise no network components so full transport capacity is available at all times. The modern, rugged design with redundant components is highly reliable in operation even under extreme climatic conditions. Special design features prevent the compromising emission of secret information (COM- PREM). Shielded rooms are no longer necessary. No special knowledge is required for installation. Encryption (and key changes) is conducted in the background fully automatically. Network Security Solutions can be installed successively in existing broadband networks without having to shut these systems down. If need be, you are provided with project services to assist you in setting up and developing your systems, e.g. planning, engineering, installation, commissioning/formal acceptance and personnel training. With the handover of the system, you have a clear-cut and complete picture of your systems and the cryptographic processes involved. Crypto AG wants to be sure users can rely on high availability in long-time operation. That is why it offers individually designed maintenance and logistics services (in-factory or on-site maintenance, logistics for spare parts/ repairs, maintenance kits). With service level agreements, these costs can be planned. 8

9 Security Management to keep security under control Security management is a central element of any reliable high-speed encryption solution. It allows the customer to define the algorithm, keys, passwords and other security settings in line with its security policy and to monitor their effectiveness. Regular key changes should be easy to configure and to run autonomously/automatically while the encryption units are in operation. Crypto AG enables all this with its SMC-1100 Security Management Centre, a modern PC/laptop application with a hardware security module and external message scheduler. The SMC-1100 is extremely simple to operate and offers a high degree of security for defining, managing and distributing security data. Mistakes in operation are largely excluded by the system design, which also minimises the amount of training required. The intuitive Windows-based graphical user interface makes the security manager s job as easy as can be. It allows him or her to display the encryption system in a simple and straightforward way, query all settings and data for all units, and put the necessary security configurations in place. Management messages are distributed to the encryption unit in encrypted form by means of Smart Cards or online over an Ethernet link, which is more convenient and emanates from a centralised point. Online distribution is date-controlled so the operations can be carried out without staff having to be present. Keys in the unit are changed without any loss of data while the unit is operating. All processes are centrally logged for later audits, etc. Security Management Centre SMC-1100 Broadband. 9

10 Crypto AG To Remain Sovereign Crypto AG is your expert partner for the efficient and secure handling of information. As a legally and economically independent Swiss company, we are not subject to any export restrictions. We have been concentrating on developing, manufacturing and implementing custom security solutions for over 55 years. Our range comprises the latest technology and comprehensive services. After-sales service and product training that guarantee autonomous operation and high availability are assured over the system s entire lifetime, whatever the user environment. You too can rely on the expertise and capability of Crypto AG. Customers from over 130 countries are already doing just that. Crypto AG, Headquarters Crypto AG P.O. Box 460 CH-6301 Zug Switzerland Tel Fax crypto@crypto.ch Crypto AG, Regional Offices Abidjan Crypto AG 01 B.P Abidjan 01 Ivory Coast Tel Fax Abu Dhabi Crypto AG Abu Dhabi P.O. Box Abu Dhabi United Arab Emirates Tel Fax Buenos Aires Crypto AG Maipu 1256 PB A 1006 Buenos Aires Argentina Tel Fax Kuala Lumpur Crypto AG Regional Office Pacific Asia Level 9B Wisma E&C 2, Lorong Dungun Kiri Damansara Heights Kuala Lumpur Malaysia Tel Fax Muscat Crypto AG Regional Office Seeb PC 111 Sultanate of Oman Tel Fax A member of The Crypto Group 2007 Crypto AG CP Broadband EN/0750

Secure telephony via classic and IP networks. office security solutions

Secure telephony via classic and IP networks. office security solutions Secure telephony via classic and IP networks office security solutions Every kind of telephone technology has its information risks... Telephone conversations are still a core function of daily communications

More information

Secure telephone communications with Voice over IP from Crypto AG

Secure telephone communications with Voice over IP from Crypto AG Secure telephone communications with Voice over IP from IT Security Solutions Voice over IP more than simply telephoning The introduction of Voice over IP (VoIP) is a common item on today s agenda for

More information

MultiCom Encryption The only encryption platform that can defend your sovereignty in all networks! Radio security solutions

MultiCom Encryption The only encryption platform that can defend your sovereignty in all networks! Radio security solutions Encryption The only encryption platform that can defend your sovereignty in all networks! Radio security solutions Your technological challenge: inhomogeneous networks homogeneous information security

More information

Fax Encryption HC-4221 / HC-4221C. Provides Maximum Protection for your Fax Communication Needs. Office Security Solutions

Fax Encryption HC-4221 / HC-4221C. Provides Maximum Protection for your Fax Communication Needs. Office Security Solutions HC-4221 / HC-4221C. Provides Maximum Protection for your Fax Communication Needs. Office Security Solutions Fax: A Classic Means of Communication. Even in this Internet age, the fax remains an indispensable

More information

The portfolio of Crypto AG: comprehensive solutions for the security of your information

The portfolio of Crypto AG: comprehensive solutions for the security of your information The portfolio of Crypto AG: comprehensive solutions for the security of your information Crypto AG your ideal partner in security Crypto AG was founded by cryptology pioneer Boris Hagelin in Zug, Switzerland,

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.

L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast. L2 Box Layer 2 Network encryption Verifiably secure, simple, fast. reliable line encryption. Nowadays internal and confidential data is exchanged between locations or computer centres of public authorities

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,

More information

Business Continuity and Disaster Recovery Solutions in Government

Business Continuity and Disaster Recovery Solutions in Government > Business Continuity and Disaster Recovery Solutions in Government Protecting Critical Data Flow for Uninterrupted Services WHITE PAPER January 2010 J. Asenjo, CISSP www.thalesgroup.com/iss Information

More information

INTRODUCTION TO MEDIA CONVERSION

INTRODUCTION TO MEDIA CONVERSION WHITE PAPER INTRODUCTION TO MEDIA CONVERSION Table of Contents Introduction 1 What is a Media Converter? 1 Advantages of Media Conversion Technology 1 Benefits of Fiber Optic Cabling 2 Types of Media Converters

More information

Computers Are Your Future. 2006 Prentice-Hall, Inc.

Computers Are Your Future. 2006 Prentice-Hall, Inc. Computers Are Your Future 2006 Prentice-Hall, Inc. Computers Are Your Future Chapter 3 Wired and Wireless Communication 2006 Prentice-Hall, Inc Slide 2 What You Will Learn... ü The definition of bandwidth

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF High Speed Ethernet Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF Hubs and Switches Hubs and Switches Shared Medium Hub The total capacity in the shared medium hub configuration (figure

More information

Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro

Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro Copyright Virgil Dobrota 2007-2008, All rights reserved 1 Course 12 - Outline 46. NGN Next Generation

More information

Network Topologies. Network Topologies

Network Topologies. Network Topologies Network Topologies LANs and WANs - Geographical coverage LANs A single geographical location, such as office building, school, etc Typically High speed and cheaper. WANs Spans more than one geographical

More information

TC Infrastructure & Application Operations. Direct Network Links.

TC Infrastructure & Application Operations. Direct Network Links. TC Infrastructure & Application Operations. Direct Links. This offering as part of the portfolio cluster. Direct Links Installation & Maintenance IT Infrastructure & Application Operations TC Infrastructure

More information

Secure voice and data communication on every wavelength. Crypto AG. RADIO SECURITY SOLUTIONS

Secure voice and data communication on every wavelength. Crypto AG. RADIO SECURITY SOLUTIONS Secure voice and data communication on every wavelength. Crypto AG. RADIO SECURITY SOLUTIONS Modern radio communication: Secure, reliable and user-friendly communication is a reliable and very easy to

More information

Ethernet Services Overview

Ethernet Services Overview Ethernet Services Overview Verizon Ethernet Overview Ethernet To Meet Your Business And Bandwidth Needs Designed to scale with your evolving bandwidth requirements, Verizon s Ethernet services deliver

More information

C20.0001 Information Systems for Managers Fall 1999

C20.0001 Information Systems for Managers Fall 1999 New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in

More information

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include

More information

Telecommunications, Networks, and Wireless Computing

Telecommunications, Networks, and Wireless Computing Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.

More information

Chapter 1 Instructor Version

Chapter 1 Instructor Version Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information

How To Build A Network For Storage Area Network (San)

How To Build A Network For Storage Area Network (San) White Paper Data Storage across the MAN by deploying a SAN over Dark Fiber by Pieter Panis, EuroFiber 1/7 1 Introduction The purpose of this document is to illustrate how a storage area network (SAN) can

More information

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense CONNECT PROTECT Communication, Networking and Security Solutions for Defense Engage Communication provides Defense, Homeland Security and Intelligence Communities with innovative and cost effective solutions

More information

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008 Making the Case for Satellite: Ensuring Business Continuity and Beyond July 2008 Ensuring Business Continuity and Beyond Ensuring business continuity is a major concern of any company in today s technology

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

How To Get More Bandwidth From Your Business Network

How To Get More Bandwidth From Your Business Network Choosing Ethernet Services IS ETHERNET THE RIGHT CHOICE FOR YOUR NETWORK? Business Ethernet Including Ethernet over Copper (EoC) and Ethernet over Digital Signal Cross-connect (EoDSx) Delivers Cost- Effective,

More information

Telecom Business Continuity Solutions FOR INTERNAL USE ONLY

Telecom Business Continuity Solutions FOR INTERNAL USE ONLY Telecom Business Continuity Solutions FOR INTERNAL USE ONLY Business continuity? Perception versus reality Perceived biggest threats in 2005* Events causing disruption in 2003-04** IT / Telecom protection

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

Glossary of Telco Terms

Glossary of Telco Terms Glossary of Telco Terms Access Generally refers to the connection between your business and the public phone network, or between your business and another dedicated location. A large portion of your business

More information

Networks 2. Gabriela Ochoa. 2014 University of Stirling CSCU9B1 Essential Skills for the Information Age. Content

Networks 2. Gabriela Ochoa. 2014 University of Stirling CSCU9B1 Essential Skills for the Information Age. Content Networks 2 Gabriela Ochoa Lecture Networks 2/Slide 1 Content How is Internet connected? Internet backbone Internet service providers (ISP) How to connect a home computer to the Internet? How do networks

More information

A review of Plesiochronous Digital Hierarchy (PDH) and Synchronous Digital Hierarchy (SDH)

A review of Plesiochronous Digital Hierarchy (PDH) and Synchronous Digital Hierarchy (SDH) 677 A review of Plesiochronous Digital Hierarchy (PDH) and Synchronous Digital Hierarchy (SDH) Olabenjo Babatunde 1, Salim Mbarouk 2 1 (Department of Information Systems Engineering, Cyprus International

More information

By: Mohsen Aminifar Fall 2014

By: Mohsen Aminifar Fall 2014 By: Mohsen Aminifar Fall 2014 Contact Information: E-Mail: m.aminifar@modares.ac.ir admin@parsenet.ir Phone : 021-22919726 09128442885 Website : http://parsenet.ir http://aminifar.ir SMS Center : 5000262175

More information

Business Services. Is Ethernet the Right Choice for Your Network? Learn More: Call us at 877.634.2728. www.megapath.com

Business Services. Is Ethernet the Right Choice for Your Network? Learn More: Call us at 877.634.2728. www.megapath.com Business Services Is Ethernet the Right Choice for Your Network? Learn More: Call us at 877.634.2728. www.megapath.com Is Ethernet the Right Choice for Your Network? Business Ethernet including Ethernet

More information

ROGERS DELIVERS THE SPEED, POWER AND RELIABILITY OF FIBRE RIGHT TO YOU.

ROGERS DELIVERS THE SPEED, POWER AND RELIABILITY OF FIBRE RIGHT TO YOU. ROGERS DELIVERS THE SPEED, POWER AND RELIABILITY OF FIBRE RIGHT TO YOU. ROGERS BUSINESS SOLUTIONS When you partner with Rogers Business Solutions, you benefit from on-going collaboration with our team

More information

Fixed Wireless Broadband

Fixed Wireless Broadband Fixed Wireless Broadband An overview of the benefits of Dreamtilt fixed wireless broadband Copyright 2013 Dreamtilt Pty Ltd A wireless network utilizes connections between nodes without the use of wires.

More information

SITRAFFIC Canto communication system. A technological leap in center-to-field communication. Intelligent Traffic Systems

SITRAFFIC Canto communication system. A technological leap in center-to-field communication. Intelligent Traffic Systems SITRAFFIC Canto communication system A technological leap in center-to-field communication Intelligent Traffic Systems SITRAFFIC Canto: Take advantage of all the benefits of a future-oriented technology

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Alcatel-Lucent 1850 TSS-3 Transport Service Switch. A versatile network termination unit

Alcatel-Lucent 1850 TSS-3 Transport Service Switch. A versatile network termination unit Alcatel-Lucent Transport Service Switch A versatile network termination unit The Alcatel-Lucent 1850 Transport Service Switch (TSS-3) is a carriergrade network termination unit (NTU). Providing a rich

More information

White paper. Reliable and Scalable TETRA networks

White paper. Reliable and Scalable TETRA networks Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA

More information

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl.

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl. Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use

More information

Course 12 Synchronous transmission multiplexing systems used in digital telephone networks

Course 12 Synchronous transmission multiplexing systems used in digital telephone networks Course 12 Synchronous transmission multiplexing systems used in digital telephone networks o Disadvantages of the PDH transmission multiplexing system PDH: no unitary international standardization of the

More information

Chapter 4 Connecting to the Internet through an ISP

Chapter 4 Connecting to the Internet through an ISP Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No

More information

2 Basic Concepts. Contents

2 Basic Concepts. Contents 2. Basic Concepts Contents 2 Basic Concepts a. Link configuration b. Topology c. Transmission mode d. Classes of networks 1 a. Link Configuration Data links A direct data link is one that establishes a

More information

CLOUD COMPUTING IN PRIVATE DEFENCE NETWORKS

CLOUD COMPUTING IN PRIVATE DEFENCE NETWORKS Romanian Military Thinking ~ 3/2015 CLOUD COMPUTING IN PRIVATE DEFENCE NETWORKS Colonel Dr D`nu] }IG~NU{ The author describes the general context of cloud computing in defence networks and the principles

More information

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts

More information

Cable TV Headend Solutions

Cable TV Headend Solutions Product Family DVX Platform Cable TV Headend Solutions The DVX platform TELESTE DVX is a complete solution for digital and analogue broadcasting infrastructures for cable operators. The offering includes

More information

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

CTS2134 Introduction to Networking. Module 07: Wide Area Networks CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data

More information

1.264 Lecture 35. Telecom: Fiber optics. Next class: Green chapter 18-21. Exercise due before class

1.264 Lecture 35. Telecom: Fiber optics. Next class: Green chapter 18-21. Exercise due before class 1.264 Lecture 35 Telecom: Fiber optics Next class: Green chapter 18-21. Exercise due before class 1 T1 T1 is shorthand for 1.5 Mbps connection T1 is the standard over copper T1 is used as a shorthand for

More information

Performance Management and Fault Management. 1 Dept. of ECE, SRM University

Performance Management and Fault Management. 1 Dept. of ECE, SRM University Performance Management and Fault Management 1 Dept. of ECE, SRM University Performance Management Performance management requires monitoring of the performance parameters for all the connections supported

More information

How To Protect Your Data From Harm With Safenet

How To Protect Your Data From Harm With Safenet SafeNet Information Security Government Solutions Disk & File Encryption Database & Application Encryption Network & WAN Encryption Identity & Access Management Application & Transaction Security Information

More information

Efficient remote access to machines and plants with SIMATIC

Efficient remote access to machines and plants with SIMATIC Efficient remote access to machines and plants with SIMATIC Telecontrol and teleservice solutions modular, flexible and secure SIMATIC NET siemens.com/industrial-remote-access Industrial remote access

More information

EDA 1200 and Mini-Link Solution. Early deployments of profitable fixed broadband

EDA 1200 and Mini-Link Solution. Early deployments of profitable fixed broadband EDA 1200 and Mini-Link Solution Early deployments of profitable fixed broadband Taking broadband further Opportunities are increasing to take broadband to areas not units. The MINI-LINK only requires a

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

Avancerede Datanet. Ole Brun Madsen Professor Department of Control Engineering University of Aalborg. Infrastruktur

Avancerede Datanet. Ole Brun Madsen Professor Department of Control Engineering University of Aalborg. Infrastruktur Department of Control Engineering Distributed Real-time Systems Avancerede Datanet Infrastruktur Ole Brun Madsen Professor Department of Control Engineering University of Aalborg Avancerede Datanet Infrastructure

More information

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking. Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:

More information

Copyright. Transport networks. Physical layer Transport and access networks. Pag. 1

Copyright. Transport networks. Physical layer Transport and access networks. Pag. 1 Physical layer Transport and access networks Gruppo Reti TLC nome.cognome@polito.it http://www.telematica.polito.it/ COMPUTER NETWORK DESIGN Physical layer review - 1 Copyright Quest opera è protetta dalla

More information

Australian Satellite Communications CREDIBLE. RELIABLE. FLEXIBLE.

Australian Satellite Communications CREDIBLE. RELIABLE. FLEXIBLE. Australian Satellite Communications CREDIBLE. RELIABLE. FLEXIBLE. Australian Satellite Communications www.ascs.com.au Experience and Expertise. Since 1985, Australian Satellite Communications (ASC) has

More information

Primary Data Center. Remote Data Center Plans (COOP), Business Continuity (BC), Disaster Recovery (DR), and data

Primary Data Center. Remote Data Center Plans (COOP), Business Continuity (BC), Disaster Recovery (DR), and data White Paper Storage Extension Network Solutions Between Data Centers Simplified, Low Cost, Networks for Storage Replication, Business Continuity and Disaster Recovery TODAY S OPERATING CLIMATE DEMANDS

More information

Cisco Mobile Network Solutions for Commercial Transit Agencies

Cisco Mobile Network Solutions for Commercial Transit Agencies Cisco Mobile Network Solutions for Commercial Transit Agencies Overview Commercial transit agencies provide a vital service to our communities. Their goal is to provide safe, affordable, and convenient

More information

WiMAX technology. An opportunity that can lead African Countries to the NET Economy. Annamaria Raviola SVP - Marketing and Business Development

WiMAX technology. An opportunity that can lead African Countries to the NET Economy. Annamaria Raviola SVP - Marketing and Business Development WiMAX technology An opportunity that can lead African Countries to the NET Economy Annamaria Raviola SVP - Marketing and Business Development Agenda Telecommunications in Africa: the present picture Wi-MAX:

More information

WE CONNECT YOU. RELIABLE ONE-STOP SERVICE.

WE CONNECT YOU. RELIABLE ONE-STOP SERVICE. LEASED LINES EASY CONNECT WE CONNECT YOU. RELIABLE ONE-STOP SERVICE. The world is growing closer together and that means companies have higher requirements when it comes to the reliable exchange of information.

More information

The part of the network that connects customers to the exchange, sometimes called the local loop or the last mile.

The part of the network that connects customers to the exchange, sometimes called the local loop or the last mile. Glossary of broadband terms 3G: Refers to the third generation of mobile phone technology following on from 2G. 3G allows for faster access to the internet and allows services including video calls and

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

Introduction to Optical Networks

Introduction to Optical Networks Yatindra Nath Singh Assistant Professor Electrical Engineering Department Indian Institute of Technology, Kanpur Email: ynsingh@ieee.org http://home.iitk.ac.in/~ynsingh 1 What are optical network? Telecomm

More information

Data Transmission. from one person or place to another. person or place to another of passing something

Data Transmission. from one person or place to another. person or place to another of passing something Data Transmission Transmission: the process of passing something from one person or place to another of passing something from one person or place to another Data Transmission Main types of Transmission

More information

Propsim enabled Mobile Ad-hoc Network Testing

Propsim enabled Mobile Ad-hoc Network Testing www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

secure For the ultimate in Cyber Defence TRL Technology

secure For the ultimate in Cyber Defence TRL Technology //Government secure Grade Network Security For the ultimate in Cyber Defence // CATAPAN Government Grade Network Security L-3 TRL has over a decade of experience in developing and supporting sophisticated

More information

Introduction to ADSL. NEXTEP Broadband White Paper. Broadband Networks Group. A primer on Asymmetric Digital Subscriber Line transmission technology.

Introduction to ADSL. NEXTEP Broadband White Paper. Broadband Networks Group. A primer on Asymmetric Digital Subscriber Line transmission technology. NEXTEP Broadband White Paper Introduction to ADSL A primer on Asymmetric Digital Subscriber Line transmission technology. A NEXTEP Broadband White Paper May 2001 Broadband Networks Group Introduction to

More information

Senetas CERTIFIED network data security - For commercial & industrial SENETAS CERTIFIED NETWORK DATA SECURITY - FOR COMMERCIAL & INDUSTRIAL

Senetas CERTIFIED network data security - For commercial & industrial SENETAS CERTIFIED NETWORK DATA SECURITY - FOR COMMERCIAL & INDUSTRIAL Senetas CERTIFIED network data security - For commercial & industrial SENETAS CERTIFIED NETWORK DATA SECURITY - FOR COMMERCIAL & INDUSTRIAL SENETAS CERTIFIED HARDWARE ENCRYPTORS ARE TRUSTED TO PROTECT

More information

Designing Reliable IP/MPLS Core Transport Networks

Designing Reliable IP/MPLS Core Transport Networks Designing Reliable IP/MPLS Core Transport Networks Matthias Ermel Workshop ITG FG 5.2.1 14. November 2008 München Content 1. Introduction 2. Protection Mechanisms 3. Failure Detection Page 1 Architecture

More information

Intelligent Solutions for the Highest IT Security Requirements

Intelligent Solutions for the Highest IT Security Requirements Intelligent Solutions for the Highest IT Security Requirements 3 Information security from the architects of modern cryptographic systems SINA (Secure Inter-Network Architecture) enables the protected

More information

Introduction to computer networks and Cloud Computing

Introduction to computer networks and Cloud Computing Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication

More information

The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class

The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class Executive Summary Network-based applications such as Voice over IP (VoIP), cloud, collaboration services

More information

Very soon. Satellite Internet Broadband Service

Very soon. Satellite Internet Broadband Service Very soon Satellite Internet Broadband Service about Yahsat Soon. TeleYemen will introduce Satellite Internet Broadband service to business sector in Yemen through YahClick. Al Yah Satellite Communications

More information

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks Network+ Guide to Networks 6 th Edition Chapter 7 Wide Area Networks Objectives Identify a variety of uses for WANs Explain different WAN topologies, including their advantages and disadvantages Compare

More information

Power over Ethernet technology for industrial Ethernet networks

Power over Ethernet technology for industrial Ethernet networks Power over Ethernet technology for industrial Ethernet networks Introduction Ethernet networking has grown beyond office and home usage to become a very successful protocol suite used in many industrial

More information

Products and Services Catalogue

Products and Services Catalogue Products and Services Catalogue Voice & Multimedia Services Voice & Multimedia Services Wholesale VoIP Wholesale VoIP (Voice over Internet Protocol) services offer cost-effective communication solutions

More information

Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR GOVERNMENT

Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR GOVERNMENT Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR SENETAS CERTIFIED HARDWARE ENCRYPTORS ARE TRUSTED BY S IN MORE THAN 20 COUNTRIES TO PROTECT SENSITIVE

More information

TAKE OFF FOR YOUR CLOUD virtual private networks (vpn)

TAKE OFF FOR YOUR CLOUD virtual private networks (vpn) INFRASTRUCTURE & NETwORK SERVICES TAKE OFF FOR YOUR CLOUD virtual private networks (vpn) Infrastructure & Network Services from T-Systems comprises all solutions that are critical to a business IT and

More information

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

ADSL BROADBAND BASICS FOR THE DOMESTIC USER. The Main Limitations of ADSL Broadband are as follows.

ADSL BROADBAND BASICS FOR THE DOMESTIC USER. The Main Limitations of ADSL Broadband are as follows. ADSL BROADBAND BASICS FOR THE DOMESTIC USER AS NOTHING MAN MADE IS PERFECT, ADSL IS NOT AN EXCEPTION. The Main Limitations of ADSL Broadband are as follows. 1. ADSL is not a Guaranteed Bandwidth Service.

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data. Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs

More information

Evaluating Carrier-Class Ethernet Services

Evaluating Carrier-Class Ethernet Services Technical Paper Evaluating Carrier-Class Ethernet Services Demand for Ethernet-based services is on the rise, and the key driving force behind this is continuous growth of data traffic in the metro/access

More information

Government Transport Networks: Minimize Lifetime Costs

Government Transport Networks: Minimize Lifetime Costs What You Will Learn Public sector organizations are preparing to upgrade their transport networks to accommodate a surge in traffic from business video and network-based backups. This white paper, intended

More information

Chapter 9 Communications and Networks

Chapter 9 Communications and Networks Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Explain the purpose of communications

More information

The data can be transmitted through a variety of different communications platforms such as:

The data can be transmitted through a variety of different communications platforms such as: COMMUNICATION NETWORK General Overview of SCADA Communications Without a properly designed communication network system, a SCADA system cannot exist. All supervisory control and data acquisition aspects

More information

WIRELESS BROADBAND SOLUTIONS FOR CABLE OPERATORS

WIRELESS BROADBAND SOLUTIONS FOR CABLE OPERATORS WIRELESS BROADBAND SOLUTIONS FOR CABLE OPERATORS »Wireless Broadband Solutions for Cable Operators Extending broadband coverage to reach new commercial and residential customers can pose major challenges.

More information

Vodacom Business Solutions Portfolio. The complete package... Your guide to business solutions from Vodacom Business

Vodacom Business Solutions Portfolio. The complete package... Your guide to business solutions from Vodacom Business The complete package... Your guide to business solutions from Vodacom Business Vodacom Business Solutions Portfolio Business to your taste... An overview of Vodacom Business Solutions portfolio Access

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

Motorola s Canopy Wireless Broadband Platform. The Secure, Flexible, Reliable Wireless Solution for Building or Extending Your Broadband Network

Motorola s Canopy Wireless Broadband Platform. The Secure, Flexible, Reliable Wireless Solution for Building or Extending Your Broadband Network Motorola s Canopy Wireless Broadband Platform The Secure, Flexible, Reliable Wireless Solution for Building or Extending Your Broadband Network Extending Broadband Coverage To Hard-to-reach Customers Carriers

More information

Technical Glossary from Frontier

Technical Glossary from Frontier Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to

More information

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN) Chapter 11: WAN Abdullah Konak School of Information Sciences and Technology Penn State Berks Wide Area Networks (WAN) The scope of a WAN covers large geographic areas including national and international

More information

Intelligent Solutions for the Highest IT Security Demands

Intelligent Solutions for the Highest IT Security Demands Intelligent Solutions for the Highest IT Security Demands 3 Information security from the architects of modern cryptographic systems SINA (Secure Inter-Network Architecture) enables the protected processing,

More information