CSIR. Over NKN PIU, NKN

Size: px
Start display at page:

Download "CSIR. Over NKN PIU, NKN"

Transcription

1 CSIR Virtual Private Network Over NKN PIU, NKN 1

2 NKN TOPOLOGY 2

3 3

4 Application Requiring High Bandwidth Virtual Laboratories Collaborative Mega Science Projects Innovative Info-Bio-Nano Experiments Non-invasive Medicare for Diseases like Cancer Diagnostic Domes as Public Health Centers in Rural Areas Country-wide Classroom University without Walls Voice Conferencing among Researchers Video Conferencing among Researchers On-line access to Electronic Resources 4

5 NKN Design Philosophy To build a scalable network, which can expand both in the Reach (spread (p in the country) and Speed. To be a common Network Backbone like national highway, wherein different categories of users shall be supported. 5

6 Features NKN High Capacity, Highly Scalable Backbone Provide Quality of Service (QoS) and Security Wide Geographical Coverage Common Standard Platform Bandwidth from Many NLD s Highly Reliable & Available by Design Test beds ( for various implementation) Dedicated edcatedand downed. 6

7 NKN CLOUD Research Labs CSIR/DAE/ISRO/ICAR Educational Institutions NTRO Cert-IN EDUSAT National Internet NKN Exchange MPL Points (NIXI) S INTERNET Clou ds Connections to Broad Band Clouds Global Networks (e.g. GEANT) National / State Data Centers/ Networks Fig-1 GENERIC MPLS CLOUD OF NKN 7

8 NKN offering MPLS VPN CSIR Orissa CSIR Rajasthan CSIR Delhi CSIR hyderabad VOD DNS MCU Server CSIR Roorkee CSIR Chennai ISP Internet Internet Gateway NKN MPLS - VPN Network Internet Gateway ISP Internet CSIR Guwahati CSIR Gujarat CSIR Kanpur CSIR Kharagpur CSIR Patna CSIR Mumbai Fig-2 CSIR VPN 8

9 What NKN will provide? Bandwidth Availability and reliability IP space/ Interface with the APNIC NOC and DC DR NOC and DC 24 X 7 Support operations support Common Services like Web/Mail/ MX/DNS etc. All the MPLS VPN V4 / V6 and L2 VPN support. Guidelines and Procedures to effectively use the NKN. Routing/ Switching equipment at the end node to connect to the NKN. 9

10 What will NKN provide? Contd. Internet bandwidth Interface with other networks ( EU-GRID and others.) Applications like Video on Demand would be hosted on the Data Center Any other PORTAL / APPLICATION is deemed fit to be kept at Data center of NKN for efficient usage 10

11 Criterion to join NKN Must be a Knowledge Creator Participate in any of the killer applications that is envisaged Minimum bandwidth interface will be 100 Mbps Must comply to the policies i of NKN IP Usage Policy Security Policy - Operations policy 11

12 What logistics are expected from End Nodes Space for equipments. ( Router/ switch/ ups/ Racks from NLD) Typically 12 X 12 kind of space. Air- Conditioned Environment UPS (5 KVA & 10 KVA Based on router supplied) 24 X 7 access to NKN personnel or persons authorized by NKN. Seating space for one NKN appointed person. 12

13 What logistics are expected from End Nodes Contd.. Safety of the equipments supplied under NKN. Cabling with in the user location for connecting to the NKN router. Right of Way with in the User Campus for cabling to be done by the long distance providers. Nodal Officer appointed will be the single point of interface for NKN. ( Passion to NKN) 13

14 What NKN will not provide? Training / Troubleshooting on applications which are run internally by the end user. Interfacing with the end nodes which are not directly connected to the NKN (this includes broadband users, any end node of other MPLS cloud) Campus LAN support / maintenance inside the End Nodes ( whether connected directly or indirectly to NKN) Addressing security issues inside the END NODES. 14

15 Start Using NKN by creating a VPN connecting all the CSIRs Objective: Objective: To enable CSIRs to advertise the exisiting public IP segments (leased from ISPs) through NKN so that NKN connected institutes can reach any of the advertised public IPs through NKN links rather than spin around through ISPs 15

16 NKN link already in the institute and the NKN router is presently configured as a MPLS PE. Assumption: The Virtual Classrooms are on the NKN IP segment. Normally, the Institute's s campus LAN segments are terminated at a Core Switch, typically installed in the Computer Centre (CC). Internet access is provided through Prxy/Firewall/UTM devices. The Institutes router (which is connected to ISP) shall be capable of peering a BGP session with NKN router and the Institute router shall announce public IP segments to this BGP session. This will help the other institutes in the NKN cloud to reach the public IPs (hence webserver and other content enabled services) through NKN link. 16

17 How Do I start using the link immediately: Currently, NKN provides IP segments from RFC 1918's 10.n.n.n. n n These IP segments could clash with the exisiting assigned segment in the Institutes and re-assigning of the NKN suggested segments may be a daunting task. However, for the specified projects, the NKN suggested IP segments can be assigned from the day one. Connect the NKN router to the Institute's gateway router. Configure the gateway router to do a BGP session with NKN router and announce the public segment (normally provided by the ISP). This link at the NKN router is configured to be in VRF instance called NKNGEN. The public IPs are announced through the NKN who are part of this VRF instance NKNGEN. This way every CSIR's can announce their public IP segments in NKN and hence all the Institutes which are part of the VRF NKNGEN can reach the respective CSIRs public segment through NKN. 17

18 How Do I start using the link immediately: Incase the NKN links to the Institutes t fails, theroutes (public segments) will automatically ceases to exist and reachability to the Institute's public segment falls back through ISP link. In case of NKN link failure the routes from the NKN CLOUD will cease to exist and thereby the gateway of the institutes will start using the Internet link that they have for normal browsing. This way the internet t is being delivered d throughh theexisting provider. To Achieve Fig-1 and Fig-3, and Fig-3 the CSIRs must connect the NKN router to the CC router and announce the IP number allocated to them either from the ISP ( currently providing the Internet) or ERNET to NKN. If the CSIR wants to announce some resource, then it can be made available to all the others in NKN. The resource can be kept at the CSIR itself or could be transferred to DATA CENTER proposed in NKN. 18

19 NKN EXISTING ISP NKN Router Placed inside the institute MAIL server Link between NKN CSIR GW Layer 3 switch Proxy server WWW server Virtual Class Room on NKN private IP Institute t Campus IP schema is not changed in the existing setup OSDD LAB with IP schema which already exists Fig 3 Inside the Institute 19

20 Internet Browsing Only using the NKN: Objective: Using Internet facility on an immediate basis through NKN. Refer Fig 4 20

21 How Do I start using Internet using the NKN: Assumption: The Public IP number provided by ISP deployed currently. In case the institute wants to have the internet facility from the NKN, then the following needs to be done: The proxy server must have the real IP provided to the institute as a part of NKN. This IP shall be advertised by the NKN to the Internet world and hence the browsing is made possible through the NKN link. During this, any failure in the NKN link will result in proxy not getting internet connectivity. The other resources like the web site / mail server etc will still use the ISP as the IP numbers belong to the ISP and has been leased out to the institute. Refer Fig 4 21

22 NKN EXISTING ISP NKN Router Placed inside the institute Link between NKN CSIR GW MAIL server WWW server GARUDA LAB with IP schema which already exists External Interface with NKN public IP Proxy server Virtual Class Room on NKN private IP Layer 3 switch Block N Proxy server Block 2 Institute t Campus IP schema is not changed in the existing setup Block 1 Fig 4 Using a Proxy with NKN ext IP for browsing purpose. 22

23 Using the NKN when the USER has PUBLIC IP from APNIC/ ARIN: That is: /24 or more from APNIC/ARIN 23

24 Using the NKN when USER has PUBLIC IP from APNIC/ ARIN: The following are the assumptions for scenario in (Fig5): User with public IP pool Multi-homing to NKN & other ISP with separate local routers (running BGP between them). USER Requirement Primary (NKN) ISP & Backup (non-nkn) ISP Exit/Entry via Primary or Backup on Primary Fails Solution for preferred exit point Mark updates from NKN only with higher local preference. Solution for preferred entry point Advertise self public pool with AS ( number of NKN itself) path prepend to other ISP only and to NKN have a ibgp session. NKN s Role Accept only end node s prefixes & filter Advertise to the Internet with the ISPs connected to NKN 24

25 NKN EXISTING ISP ibgp between the NKN CSIR GW MAIL server Institute has IP number (public) provided by APNIC / ARIN NKN Router Placed inside the institute External Interface with NKN public IP Proxy server Layer 3 switch Proxy server WWW server GARUDA LAB with IP schema which already exists Virtual Class Room on NKN private IP Block N Block 1 Block 2 Institute Campus IP schema is not changed in the existing setup Fig 5 institutes having their own PUBLIC IP from APNIC/ARI N 25

26 Fanning-Out NKN NKN PoPP PoPP Engineering i collège Poly-tech Egress NKN Router NKN Cloud Ingress NKN Router Some NLD providing connectivity Médical collège VPN Green Site DAE LAB Education community VPN Blue Site BIO TECH PE -NKN MAIN UNIVERSITY With IN CAMPUS Colleges/ dpts 26

27 Short Term Migrating to NKN LAB #1 NKN IP Address Scheme Internet Service Provider NKN IP Address Scheme LAB # NKN RESOURCE DATA CENTER Internet Service Provider NKN CLOUD Internet Service Provider LAB #2 NKN IP Address Scheme NKN IP Address Scheme LAB #3 27

28 Migrating to NKN Institute #1 NKN IP SCHEMA CWCR Internet Service Provider NKN IP SCHEMA CWCR Institute # NKN RESOURCE DATA CENTER Internet Service Provider NKN CLOUD Internet Service Provider Institute #2 NKN IP SCHEMA CWCR NKN IP SCHEMA CWCR Institute #3 28

29 Short Term Migration Each one of the closed user group can advertise the IP numbers through the NKN. ( It will be the Public IP given to the organisation by the ISP currently engaged.) A separate VRF will be created which will allow the organisation to browse the others in the closed user group. This will also provide Internet facility. Provision can also be made on a short term basis for public IP for the organisation from NKN to cater to the PUBLIC/ INTERNET demands. 29

30 Killer Applications Peer to Peer Collaboration Desktop Video Enterprise ERP Central Web Based Applications Library resources MOST IMPORTANTLY A DESIGN THAT CAN CATER TO FURTURE INOOVATIVE IDEAS 30

31 HOW TO CONNECT EXISTING GARUDA LAB TO NKN? 31

32 HOW TO CONNECT GARUDA LABS? GARUDA: It has been decided to provide the bandwidth to Garuda through NKN. It is important that the LAB taking part in the GARUDA project gets a link from the router provided to the institutions through NKN project. Suggestion: The LAB has to extend the link from the NKN router which in many cases will be in the Computer Center and in some cases it could be a part of some other project like ERNET PoP. The approximate distance is 0-2 KM in most cases. Connect the cable provided to the NKN router in the institute and Garuda LAB. ( responsibility of GARUDA) 32

33 ISP Reliance/Bharti/TATA New Delhi/Hyderabad Internet Gateway Primary For NKN NKN Tier 1/2/3 POP PE Router Institute PE ISP Backup Institute Network Tier 1/2/3 POP PE Routers NKN MPLS Backbone Tier 1/2 POP PE Router Proxy server MAIL server WWW server Tier 1 POP P Router GARUDA LAB Details within the INSTITUTE Internal Cabling Fig: 6 Connecting Garuda lab to NKN 33

34 THANK YOU For further information: Contact: 34

National Knowledge Network. Dr. B. K. Murthy Director & Head National Knowledge Network Division Ministry of Communications and IT Govt.

National Knowledge Network. Dr. B. K. Murthy Director & Head National Knowledge Network Division Ministry of Communications and IT Govt. National Knowledge Network Dr. B. K. Murthy Director & Head National Knowledge Network Division Ministry of Communications and IT Govt. of India Contemporary INDIA Large and Complex Democracy More than

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

IPv6 Addressing. ISP Training Workshops

IPv6 Addressing. ISP Training Workshops IPv6 Addressing ISP Training Workshops 1 Where to get IPv6 addresses p Your upstream ISP p Africa n AfriNIC http://www.afrinic.net p Asia and the Pacific n APNIC http://www.apnic.net p North America n

More information

DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA

DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in

More information

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY CHAPTER 6 DESIGNING A NETWORK TOPOLOGY Expected Outcomes Able to identify terminology that will help student discuss technical goals with customer. Able to introduce a checklist that can be used to determine

More information

Enterprise Network Simulation Using MPLS- BGP

Enterprise Network Simulation Using MPLS- BGP Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy,

More information

ISP Case Study. UUNET UK (1997) ISP/IXP Workshops. ISP/IXP Workshops. 1999, Cisco Systems, Inc.

ISP Case Study. UUNET UK (1997) ISP/IXP Workshops. ISP/IXP Workshops. 1999, Cisco Systems, Inc. ISP Case Study UUNET UK (1997) ISP/IXP Workshops ISP/IXP Workshops 1999, Cisco Systems, Inc. 1 Acknowledgements Thanks are due to UUNET UK for allowing the use of their configuration information and network

More information

Address Scheme Planning for an ISP backbone Network

Address Scheme Planning for an ISP backbone Network Address Scheme Planning for an ISP backbone Network Philip Smith Consulting Engineering, Office of the CTO Version 0.1 (draft) LIST OF FIGURES 2 INTRODUCTION 3 BACKGROUND 3 BUSINESS MODEL 3 ADDRESS PLAN

More information

OBJECTIVE. National Knowledge Network (NKN) project is aimed at

OBJECTIVE. National Knowledge Network (NKN) project is aimed at OBJECTIVE NKN AIMS TO BRING TOGETHER ALL THE STAKEHOLDERS FROM SCIENCE, TECHNOLOGY, HIGHER EDUCATION, HEALTHCARE, AGRICULTURE AND GOVERNANCE TO A COMMON PLATFORM. NKN is a revolutionary step towards creating

More information

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009 MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W

More information

Indian NERN: ERNET. Presented by : Meharban Singh, ERNET India

Indian NERN: ERNET. Presented by : Meharban Singh, ERNET India Indian NERN: ERNET Presented by : Meharban Singh, ERNET India Presentation Outline ERNET India Introduction Networks established by ERNET India ERNET Network for Indian Grid GARUDA Network DAE - LHC grid

More information

Using OSPF in an MPLS VPN Environment

Using OSPF in an MPLS VPN Environment Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest

More information

Advanced BGP Policy. Advanced Topics

Advanced BGP Policy. Advanced Topics Advanced BGP Policy George Wu TCOM690 Advanced Topics Route redundancy Load balancing Routing Symmetry 1 Route Optimization Issues Redundancy provide multiple alternate paths usually multiple connections

More information

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks Routing in Small Networks Internet Routing Overview AS, IGP,, BGP in small networks distance vector or link state protocols like RIP or OSPF can be used for dynamic routing it is possible that every router

More information

BGP1 Multihoming and Traffic Engineering

BGP1 Multihoming and Traffic Engineering 83950 Telecommunications Laboratory Course BGP1 BGP1 Multihoming and Traffic Engineering date & time student # name 1 2 bgp-tyo.tex,v 1.11 2005/04/18 14:09:14 ams Exp 1/17 Part I Home Assignment 1 General

More information

How To Make A Network Secure

How To Make A Network Secure 1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance

More information

LHCONE Site Connections

LHCONE Site Connections LHCONE Site Connections Michael O Connor moc@es.net ESnet Network Engineering Asia Tier Center Forum on Networking Daejeon, South Korea September 23, 2015 Outline Introduction ESnet LHCONE Traffic Volumes

More information

IP interconnect interface for SIP/SIP-I

IP interconnect interface for SIP/SIP-I Page INTERCONNECT SPECIFICATION Public 1 (7) IP interconnect interface for SIP/SIP-I 0 Document history... 2 1 Scope... 2 2 References... 2 3 Definitions/Acronyms... 3 4 IP Interconnect specification...

More information

Course Description. Students Will Learn

Course Description. Students Will Learn Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user

More information

Introduction to The Internet

Introduction to The Internet Introduction to The Internet ISP Workshops Last updated 5 September 2014 1 Introduction to the Internet p Topologies and Definitions p IP Addressing p Internet Hierarchy p Gluing it all together 2 Topologies

More information

Packet Tracer 3 Lab VLSM 2 Solution

Packet Tracer 3 Lab VLSM 2 Solution Packet Tracer 3 Lab VLSM 2 Solution Objective Create a simulated network topology using Packet Tracer Design an IP addressing scheme using a Class B subnetwork address and VLSM Apply IP addresses to the

More information

HP Networking BGP and MPLS technology training

HP Networking BGP and MPLS technology training Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,

More information

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT

More information

Demonstrating the high performance and feature richness of the compact MX Series

Demonstrating the high performance and feature richness of the compact MX Series WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table

More information

Internet and Services

Internet and Services 3 Internet and Services 3.1 INTRODUCTION The Internet began way back in 1969 when it was called ARPANet (Advanced Research Project Agency Network) and was used exclusively for military purposes. It soon

More information

Network Level Multihoming and BGP Challenges

Network Level Multihoming and BGP Challenges Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology jili@cc.hut.fi Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.

More information

Open Transit Internet

Open Transit Internet international wholesale solutions Open Transit Internet data, a major player in the wholesale market Choose reliability and quality: Take advantage of our in-depth knowledge of the industry resulting from

More information

Module 12 Multihoming to the Same ISP

Module 12 Multihoming to the Same ISP Module 12 Multihoming to the Same ISP Objective: To investigate various methods for multihoming onto the same upstream s backbone Prerequisites: Module 11 and Multihoming Presentation The following will

More information

Introduction to The Internet. ISP/IXP Workshops

Introduction to The Internet. ISP/IXP Workshops Introduction to The Internet ISP/IXP Workshops 1 Introduction to the Internet Topologies and Definitions IP Addressing Internet Hierarchy Gluing it all together 2 Topologies and Definitions What does all

More information

SwiftStack Global Cluster Deployment Guide

SwiftStack Global Cluster Deployment Guide OpenStack Swift SwiftStack Global Cluster Deployment Guide Table of Contents Planning Creating Regions Regions Connectivity Requirements Private Connectivity Bandwidth Sizing VPN Connectivity Proxy Read

More information

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point

More information

Universal Network Access Policy

Universal Network Access Policy Universal Network Access Policy Purpose Poynton Workmens Club makes extensive use of network ed Information Technology resources to support its research and administration functions and provides a variety

More information

BGP. 1. Internet Routing

BGP. 1. Internet Routing BGP 1. Internet Routing (C) Herbert Haas 2005/03/11 1 Internet Routing Interior Gateway Protocols (IGPs) not suitable for Inter-ISP routing Technical metrics only No policy features Inter-ISP routing is

More information

DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER

DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER Sarita Sharma 1, Davender Saini 2 1 Student M. Tech. ECE (2013-2015) Gurgaon Institute of Technology Management (M.D.U)

More information

STPI Broadband Business Internet Services. Experience True Broadband

STPI Broadband Business Internet Services. Experience True Broadband STPI Broadband Business Internet Services Experience True Broadband STPI Internet Services: Adding Value to your Business The first service provider in the country to start commercial Internet Services

More information

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013 Transitioning to BGP ISP Workshops Last updated 24 April 2013 1 Scaling the network How to get out of carrying all prefixes in IGP 2 Why use BGP rather than IGP? p IGP has Limitations: n The more routing

More information

Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution

Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution draft-xu-virtual-subnet-06 Xiaohu Xu (xuxh@huawei.com) IETF82, TAIWAN Why VM Mobility across Data Centers Data center maintenance Applications

More information

Simple Multihoming. ISP/IXP Workshops

Simple Multihoming. ISP/IXP Workshops Simple Multihoming ISP/IXP Workshops 1 Why Multihome? Redundancy One connection to internet means the network is dependent on: Local router (configuration, software, hardware) WAN media (physical failure,

More information

Euro6IX project and Italian IPv6 Task Force

Euro6IX project and Italian IPv6 Task Force Pisa, 11/05/05 Background information Telecom Italia Lab is the research department of Telecom Italia Group Working on IPv6 since 1995 and actively contributing to its development and standardization (FC

More information

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need

More information

MPLS Architecture for evaluating end-to-end delivery

MPLS Architecture for evaluating end-to-end delivery International Journal of Scientific and Research Publications, Volume 2, Issue 11, November 2012 1 MPLS Architecture for evaluating end-to-end delivery Nikita Wadhera Lovely Professional University Abstract-

More information

SERVICE DESCRIPTION INTERNET TRANSIT 04.05.15 / 2.6.4

SERVICE DESCRIPTION INTERNET TRANSIT 04.05.15 / 2.6.4 SERVICE DESCRIPTION INTERNET TRANSIT 04.05.15 / 2.6.4 1 INTRODUCTION 4 2 DEFINITIONS AND ABBREVIATIONS 4 3 SERVICE OVERVIEW NATIONAL AND INTERNATIONAL 5 3.1 Geographic cover Internet Transit... 5 3.1.1

More information

About Cablenet. Ownership. Shareholders are:

About Cablenet. Ownership. Shareholders are: An Overview About Cablenet Ownership Cablenet is a privately owned company that offers telecommunication and entertainment services to the corporate and retail markets. Shareholders are: CN Shiacolas Group

More information

F5 Silverline DDoS Protection Onboarding: Technical Note

F5 Silverline DDoS Protection Onboarding: Technical Note F5 Silverline DDoS Protection Onboarding: Technical Note F5 Silverline DDoS Protection onboarding F5 Networks is the first leading application services company to offer a single-vendor hybrid solution

More information

Computer Cell (Information & Communication Technology) Research Center

Computer Cell (Information & Communication Technology) Research Center Computer Cell (Information & Communication Technology) Research Center Post* (01) Deputy Manager IT 4 Year Bachelors or Masters of design, Commissioning and maintenance of Local and Wide Area Networks

More information

National Education Network. KAREN School Cluster High-level Design

National Education Network. KAREN School Cluster High-level Design National Education Network KAREN School Cluster High-level Design Contents 1 Audience... 3 2 Reference Documents... 3 3 Version control... 3 4 Review and Approval... 3 5 Distribution... 3 6 Background...

More information

PREPARED FOR ABC CORPORATION

PREPARED FOR ABC CORPORATION NETWORK DESIGN PROPOSAL PREPARED FOR ABC CORPORATION Prepared by Crystal Technologies PROPRIETARY AND CO NF IDE NTIAL Network Design Proposal PREPARED FOR ABC CORPORATION INC. ARTICLE I. OVERVIEW/HISTORY

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Understanding Route Redistribution & Filtering

Understanding Route Redistribution & Filtering Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......

More information

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs. Virtual Private LAN Service (VPLS) A WAN that thinks it s a LAN. VPLS is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use Virtual Private LAN Service

More information

Introduction to Routing

Introduction to Routing Introduction to Routing How traffic flows on the Internet Philip Smith pfs@cisco.com RIPE NCC Regional Meeting, Moscow, 16-18 18 June 2004 1 Abstract Presentation introduces some of the terminologies used,

More information

IPv6, Perspective from small to medium ISP

IPv6, Perspective from small to medium ISP IPv6, Perspective from small to medium ISP April 13 th, 2010 INET Conference, Hong Kong Christian Dwinantyo Overview Some myths and facts about IPv6 Implementation Strategy Before you begin Case study:

More information

GÉANT MD-VPN Service Description High performance IP-VPN connectivity to support European Research and Education

GÉANT MD-VPN Service Description High performance IP-VPN connectivity to support European Research and Education GÉANT MD-VPN Service Description High performance IP-VPN connectivity to support European Research and Education Issue Date: 12 June 2015 1 1 GÉANT MD-VPN service description The

More information

Course Contents CCNP (CISco certified network professional)

Course Contents CCNP (CISco certified network professional) Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,

More information

IP Telephony Management

IP Telephony Management IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public

The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com Introduction Well understood facts: o Fast is better than slow but it costs more to be fast o Network has to be fast and

More information

Campus LAN at NKN Member Institutions

Campus LAN at NKN Member Institutions Campus LAN at NKN Member Institutions RS MANI rsm@nkn.in 1/7/2015 3 rd Annual workshop 1 Efficient utilization Come from: Good Campus LAN Speed Segregation of LANs QoS Resilient Access Controls ( L2 and

More information

Optimizing Networks for NASPI

Optimizing Networks for NASPI Optimizing Networks for NASPI Scott Pelton, CISSP National Director AT&T Enterprise Network Architecture Center 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks

More information

Network Technologies

Network Technologies Network Technologies Telephone Networks IP Networks ATM Networks Three Network Technologies Telephone Network The largest worldwide computer network, specialized for voice ing technique: Circuit-switching

More information

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:

More information

Profitably Get High Speed, Reliable CE 2.0 Services Out to Small and Medium Business Using EFM over Copper

Profitably Get High Speed, Reliable CE 2.0 Services Out to Small and Medium Business Using EFM over Copper Profitably Get High Speed, Reliable CE 2.0 Services Out to Small and Medium Business Using EFM over Copper The Small and Medium Business (SMB) Ethernet services market is creating huge access, value added

More information

Examination. IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491

Examination. IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491 Examination IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491 Date: December 15 2009 14:00 18:00 1. No help material is allowed - You

More information

A TYPICAL TELECOMMUNICATIONS NOC (an overview) Prepared by: Bode A. Oladipo

A TYPICAL TELECOMMUNICATIONS NOC (an overview) Prepared by: Bode A. Oladipo A TYPICAL TELECOMMUNICATIONS NOC (an overview) Prepared by: Bode A. Oladipo A BRIEF HISTORY Early versions of NOCs have been around since the 1960s. A Network Control Center was opened in New York by AT&T

More information

Understanding Virtual Router and Virtual Systems

Understanding Virtual Router and Virtual Systems Understanding Virtual Router and Virtual Systems PAN- OS 6.0 Humair Ali Professional Services Content Table of Contents VIRTUAL ROUTER... 5 CONNECTED... 8 STATIC ROUTING... 9 OSPF... 11 BGP... 17 IMPORT

More information

Indonesia Internet exchange IIX IIX and IIXv6 Development Update 2007

Indonesia Internet exchange IIX IIX and IIXv6 Development Update 2007 Indonesia Internet exchange IIX IIX and IIXv6 Development Update 2007 Andy Kurniawan admin@iix.net.id Overview Indonesian Internet History Birth of IIX The Role of IIX during the Monetary Crisis IIX Operation

More information

Introduction to MPLS-based VPNs

Introduction to MPLS-based VPNs Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions

More information

IPv6 over IPv4/MPLS Networks: The 6PE approach

IPv6 over IPv4/MPLS Networks: The 6PE approach IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager (aliako@grnet.gr) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25

More information

Small Business Server Part 2

Small Business Server Part 2 Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP director@ciaops.com Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS

More information

Policy Implementation and Experience Report. Leslie Nobile

Policy Implementation and Experience Report. Leslie Nobile Policy Implementation and Experience Report Leslie Nobile Recently Implemented Policies ARIN-2012-5: Removal of Renumbering Requirement for Small Multi-homers Ø No longer required to return and renumber

More information

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion Key Data Product #: 3380 Course #: 6420A Number of Days: 5 Format: Certification Exams: Instructor-Led None This course syllabus should be used to determine whether the course is appropriate for the students,

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Remote Voting Conference

Remote Voting Conference Remote Voting Conference Logical Architecture Connectivity Central IT Infra NIST Best reachability in India for R-Voting Initiative 200+ Physical MPLS POPs across India 5 Regional Data Centre at Pune,

More information

Simple Multihoming. ISP Workshops. Last updated 30 th March 2015

Simple Multihoming. ISP Workshops. Last updated 30 th March 2015 Simple Multihoming ISP Workshops Last updated 30 th March 2015 1 Why Multihome? p Redundancy n One connection to internet means the network is dependent on: p Local router (configuration, software, hardware)

More information

Network-Wide Capacity Planning with Route Analytics

Network-Wide Capacity Planning with Route Analytics with Route Analytics Executive Summary Capacity planning is an important business process in large IP networks for ensuring reliable application and service delivery. In the days of fixed circuits and

More information

NTT - A global IPv6 deployment case study

NTT - A global IPv6 deployment case study About NTT NTT - A global IPv6 deployment case study Adoption considerations An Adoption how-to IPv6 beyond the transition Hikari-TV Earthquake warning service 6 All backbone equipment needs to be audited

More information

Implementing VPN over MPLS

Implementing VPN over MPLS IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over

More information

How To Build A Lightpath Network For Multiple Lightpath Projects

How To Build A Lightpath Network For Multiple Lightpath Projects Building a LAN to Support Multiple Lightpath Projects Ronald van der Pol About SARA Computing and Networking services Houses and operates national supercomputer Huygens Houses and operates national

More information

KENET NETWORK INFRASTUCTURE. KENNEDY ASEDA kaseda@kenet.or.ke

KENET NETWORK INFRASTUCTURE. KENNEDY ASEDA kaseda@kenet.or.ke KENET NETWORK INFRASTUCTURE KENNEDY ASEDA kaseda@kenet.or.ke Country of marathon winners? 2 Google Confidential and Proprietary Contents Network Infrastructure Network Operations Achievements & Challenges

More information

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service

More information

A Smart Telephone Answering Machine with Voice Message Forwarding Capability

A Smart Telephone Answering Machine with Voice Message Forwarding Capability A Smart Telephone Answering Machine with Voice Message Forwarding Capability Chih-Hung Huang 1 Cheng Wen 2 Kuang-Chiung Chang 3 1 Department of Information Management, Lunghwa University of Science and

More information

Understanding Large Internet Service Provider Backbone Networks

Understanding Large Internet Service Provider Backbone Networks Understanding Large Internet Service Provider Backbone Networks Joel M. Gottlieb IP Network Management & Performance Department AT&T Labs Research Florham Park, New Jersey joel@research.att.com Purpose

More information

The Key to Cost-Effective WAN Optimization - White Paper

The Key to Cost-Effective WAN Optimization - White Paper The Key to Cost-Effective WAN Optimization - White Paper Table of Contents General...3 The Challenges of WAN Link Management in the Datacenter...3 Link Up-time and Business Continuity...3 The Active-backup

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight

More information

Chapter 1 Connecting the Router to the Internet

Chapter 1 Connecting the Router to the Internet Chapter 1 Connecting the Router to the Internet This chapter describes how to set up the router on your Local Area Network (LAN) and connect to the Internet. It describes how to set up your wireless ADSL

More information

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing

More information

Peering in Hong Kong. Che-Hoo CHENG CUHK/HKIX www.hkix.net

Peering in Hong Kong. Che-Hoo CHENG CUHK/HKIX www.hkix.net Peering in Hong Kong Che-Hoo CHENG CUHK/HKIX www.hkix.net How Internet Operates in simple terms Internet is composed of networks of ISPs and users User networks connect to ISPs Small ISPs connect to large

More information

CCNA Discovery: Designing and Supporting Computer Networks

CCNA Discovery: Designing and Supporting Computer Networks CCNA Discovery: Designing and Supporting Computer Networks Overview of Case Studies Karen Alderson kalderso@cisco.com 1 CCNA Discovery Course Sequence CCNA Discovery Networking for Home and Small Businesses

More information

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers

More information

COMPTEL PLUS Keys To Profitably Delivering VoIP to SMBs. Hosted IP-PBX and IP Trunking

COMPTEL PLUS Keys To Profitably Delivering VoIP to SMBs. Hosted IP-PBX and IP Trunking COMPTEL PLUS Keys To Profitably Delivering VoIP to SMBs Hosted IP-PBX and IP Trunking 34 Topics for Discussion COSTS Hardware, Install, Network & Seat, Distribution, & Support Costs Pricing in SMB Market

More information

20. Switched Local Area Networks

20. Switched Local Area Networks 20. Switched Local Area Networks n Addressing in LANs (ARP) n Spanning tree algorithm n Forwarding in switched Ethernet LANs n Virtual LANs n Layer 3 switching n Datacenter networks John DeHart Based on

More information

10233B: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010

10233B: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Course: 10233B: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Description: About this Course This five-day, instructor-led course provides you with the knowledge and skills

More information

Layer 3 Network + Dedicated Internet Connectivity

Layer 3 Network + Dedicated Internet Connectivity Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for

More information

Designing a Microsoft Exchange Server 2003 Organization

Designing a Microsoft Exchange Server 2003 Organization Designing a Microsoft Exchange Server 2003 Organization Course 2008 - Two days - Instructor-led - Hands-On Introduction This two-day instructor-led course provides students with the knowledge and skills

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

Simplify Your Route to the Internet:

Simplify Your Route to the Internet: Expert Reference Series of White Papers Simplify Your Route to the Internet: Three Advantages of Using LISP 1-800-COURSES www.globalknowledge.com Simplify Your Route to the Internet: Three Advantages of

More information

Teleworker User Guide

Teleworker User Guide Teleworker User Guide Teleworker Service The Teleworker Service enables employees to work remotely with full access to voice mail, conferencing, and other features of the office phone system. The service

More information

S-38.3192 ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006

S-38.3192 ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006 S-38.3192 ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006 Original version: Johanna Nieminen and Timo Viipuri (2005) Modified: Timo-Pekka Heikkinen, Juha Järvinen and Yavor Ivanov (2006) Task

More information

Border Gateway Protocol (BGP-4)

Border Gateway Protocol (BGP-4) Vanguard Applications Ware IP and LAN Feature Protocols Border Gateway Protocol (BGP-4) Notice 2008 Vanguard Networks 25 Forbes Blvd Foxboro, MA 02035 Phone: (508) 964 6200 Fax: (508) 543 0237 All rights

More information