Evolving Optical Transport Network Security
|
|
- Amberly Daniels
- 8 years ago
- Views:
Transcription
1 Evolving Optical Transport Network Security May 15, 2012 Prepared by: John Kimmins Executive Director Copyright 2012 All Rights reserved 1
2 Outline Overview of Optical Communications and Transport Networks Evolving Transport Network Technology Potential Security Issues Security Risk Management 2
3 Drivers for Optical Communications Exploding bandwidth demands Annual growth of 50% or more to support services such as 3G and 4G wireless (backhaul) Streaming video Cloud services On-line gaming Capacity of optical systems is hundreds of times greater than that of electrical or radio-wave systems Need for agility, scalability and sustainability to meet rising customer expectations Shift from relatively static TDM-based services to rapidly changing IP/Ethernet-based services 3
4 Optical Communications Stack Options Transported Traffic (voice, video, data) FDDI Ethernet SONET Fibre Channel Ethernet SONET Fibre Channel Ethernet SONET OTN Fibre Channel Inside Plant WDM (typically DWDM) Optical Fiber Optical Fiber Cable Outside Plant 4
5 Illustrative Physical Network View Core/Long-Haul (undersea and terrestrial) Distribution/Metro Access/ Last mile 5
6 Evolving Transport Network Technology - 1 Automatically Switched Optical Network (ASON) is an emerging control plane technology that Automates discovery and provisioning of network resources and connections Allows for customer control over optical network connections Permits dynamic policy-driven network control Transport network changes are initiated by a customer or management system Signaling controls the creation and removal of connections Customer connects to the transport plane through a physical interface and communicates with the control plane via a User Network Interface (UNI) 6
7 Evolving Transport Network Technology - 2 Automated provisioning allows for Dynamic bandwidth allocation based on demand Quick end-to-end connection setup and teardown Efficient rerouting and resource usage Reduced labor costs associated with manual tasks and customer/service provider interactions Time-efficient response to changing customer needs ASON also supports Connection protection and restoration Address and wavelength assignment Traffic engineering Many Quality of Service (QoS) levels Multiple types of traffic (though it may be optimized for IP) 7
8 ASON Architecture Interfaces Service demarcation points are where call control is provided Inter-domain interfaces are service demarcation points 8
9 ASON Network Interfaces UNI UNI-C UNI-N NE Provider A NE E-NNI NE Provider B UNI UNI-N NE UNI-C User-Network Interface (UNI) Separates the concerns of the user and provider Enables client-driven end-to-end service activation External Network-Network Interface (E-NNI) enables End-to-end service activation Multi-carrier and vendor inter-working Independence of survivability schemes for each domain Internal Network-Network Interface (I-NNI) supports Intra-domain connection establishment Explicit connection operations on individual switches I-NNI Domain 1 E-NNI E-NNI Domain 2 UNI and E-NNI are supported by a family of ITU-T and OIF signaling protocols I-NNI is considered proprietary 9
10 Growth of the Security Threats High Sophistication Low back doors disabling audits self-replicating code password guessing Sophistication Of Available Tools/Attacks Growing packet spoofing burglaries sniffers sweepers exploiting known vulnerabilities password cracking hijacking sessions stealth / advanced scanning techniques denial of service automated probes/scans graphic user interface network mgmt. diagnostics Supply Chain Stuxnet? Counterfeits cross site scripting Botnets Mobile Malware RSA Compromise Advanced Persistent Threat distributed attack tools www attacks
11 Emerging Risks & Impacts Increases the exposure of the core optical transport network With new user interface, unauthorized bandwidth requests may enable denial-of-service attacks New routing protocols may not be sufficiently protected and create network instability Network forensics may be more difficult in a dynamic environment Connections may be temporarily set up to support potential attacks and then disappear Gateway products will be emerging to mediate network access Testing of security features will be required to determine protection level 11
12 Security Risk Management Roadmap Assess Security Address risk Platforms, applications, NEs & interfaces Process flows Security architecture Security management Procurement Process Controls Vulnerability Mitigation Processes Security design Operations testing & turn-up New Services Rollout Controls process Vulnerability assessment Procedures Training Service testing & turn-up Threat & Vulnerability Monitoring Patch management Periodic Vulnerability assessments Training Current Network Infrastructure New Customer Services New Network Technology Insertion Evolving Network Infrastructure 12
13 Powerhouse Research. Practical Solutions. 13
Computer System Security Updates
Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),
More informationDefense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
More informationRisk Assessment and Cloud Strategy Development: Getting it Right this Time!
Risk Assessment and Cloud Strategy Development: Getting it Right this Time! Barbara Endicott-Popovsky, PhD University of Washington Center of Information Assurance and Cybersecurity Kirsten Ferguson-Boucher
More informationWorldwide Interoperability Demo On-Demand Ethernet Services. ECOC 2007 September 17-19 Berlin, Germany
Worldwide Interoperability Demo On-Demand Ethernet Services ECOC 2007 September 17-19 Berlin, Germany Ericsson In Optical Networking Established leader, with the vision and experience to realise Full Service
More informationQuelle sécurité dans une banque? " Sécurité des transactions électroniques sur Internet et KYC"
Quelle sécurité dans une banque? " Sécurité des transactions électroniques sur Internet et KYC" Genève- UIPF 27 Nov.2010 La mission de WISeKey est de faciliter la croissance économique globale en sécurisant
More informationRelationship between SMP, ASON, GMPLS and SDN
Relationship between SMP, ASON, GMPLS and SDN With the introduction of a control plane in optical networks, this white paper describes the relationships between different protocols and architectures. Introduction
More informationHomeland Security Perspectives: Cyber Security Partnerships and Measurement Activities
16 Oct 2012 Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities Bradford Willke Cyber Security Advisor, Mid Atlantic Region National Cyber Security Division (NCSD) Office
More informationData Platform Security. Vinod Kumar Technology Evangelist www.extremeexperts.com http://blogs.sqlxml.org/vinodkumar
Data Platform Security Vinod Kumar Technology Evangelist www.extremeexperts.com http://blogs.sqlxml.org/vinodkumar Agenda Problem Statement Security for Enterprise Security Defaults - Vulnerabilities Configurations
More informationOPTICAL TRANSPORT NETWORKS
OPTICAL TRANSPORT NETWORKS EVOLUTION, NOT REVOLUTION by Brent Allen and James Rouse Nortel Networks, OPTera Metro Solutions KANATA, Canada This paper describes how the deployment today of an Optical Network
More informationSecuring SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
More informationHACKING RELOADED. Hacken IS simple! Christian H. Gresser cgresser@nesec.de
HACKING RELOADED Hacken IS simple! Christian H. Gresser cgresser@nesec.de Agenda About NESEC IT-Security and control Systems Hacking is easy A short example where we currently are Possible solutions IT-security
More informationAchieving Truly Secure Cloud Communications. How to navigate evolving security threats
Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.
More informationTransport SDN Toolkit: Framework and APIs. John McDonough OIF Vice President NEC BTE 2015
Transport SDN Toolkit: Framework and APIs John McDonough OIF Vice President NEC BTE 2015 Transport SDN Toolkit Providing carriers with essential tools in the Transport SDN toolkit How to apply SDN to a
More informationDDos. Distributed Denial of Service Attacks. by Mark Schuchter
DDos Distributed Denial of Service Attacks by Mark Schuchter Overview Introduction Why? Timeline How? Typical attack (UNIX) Typical attack (Windows) Introduction limited and consumable resources (memory,
More informationCOPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments
Contents Foreword Preface Acknowledgments 1 Introduction 1 1.1 Motivation for Network Convergence 1 1.2 The Core Network 2 1.3 Legacy Service Requirements 4 1.4 New Service Requirements 5 1.5 Architectures
More informationCisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
More informationBeyond the Noise: More Complex Issues with Incident Response
Beyond the Noise: More Complex Issues with Incident Response IFIP WG Meeting, June 30, 2006 David Dittrich Center for Information Assurance and Cybersecurity/ The Information School University of Washington
More informationThe Evolution of the Central Office
The Gateway to Learning an All IP Network The Evolution of the Central Office -Where did all the DS-1s go? Presented by: Steven Senne, P.E. APRIL 27-30, 2014 ACE/RUS SCHOOL AND SYMPOSIUM 1 The New Central
More informationASON for Optical Networks
1/287 01-FGC1010609 Rev B ASON for Optical Networks Ericsson Control Plane for DWDM Optically Switched Networks ASON for MHL3000 Introduction The growing demand for multiple service is changing the network
More informationCybersecurity Strategic Talent Management. March, 2012
Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,
More informationCarrier Ethernet: New Game Plan for Media Converters
Introduction IEEE Std. 802.3ah, also referred to as Ethernet in the First Mile (EFM) standard, has a well established name within the industry today. It lays out ground rules for implementing Ethernet
More informationGMPLS Network Management: Challenges and Solutions
GMPLS Network Management: Challenges and Solutions Thomas D. Nadeau Technical Leader 1 Fundamental Question Why is network management so important to the success of GMPLS/UCP? 2 Agenda Motivations and
More informationNETWORK SECURITY ASPECTS & VULNERABILITIES
NETWORK SECURITY ASPECTS & VULNERABILITIES Luis Sousa Cardoso FIINA President Brdo pri Kranju, 19. in 20. maj 2003 1 Background Importance of Network Explosive growth of computers and network - To protect
More informationRecommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings
More informationSudden Impact: How Cloud Services Affect the Network and Drive Business Transformation. Monday, March 11, 2013 2:30-3:15 p.m.
Sudden Impact: How Cloud Services Affect the Network and Drive Business Transformation Monday, March 11, 2013 2:30-3:15 p.m. PLEASE SILENCE YOUR CELL PHONES THANK YOU! Moderator: Eric Clelland, CMO and
More informationOIF Activities in Transport SDN
OIF Activities in Transport SDN Jonathan Sadler Vice Chairman OIF Technical Committee Coriant, USA Light Reading Big Telecom Event Chicago, June 16 Outline Premise Transport Control Systems Past Experiences
More informationNetwork Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media
IT 4823 Information Security Concepts and Administration March 17 Network Threats Notice: This session is being recorded. Happy 50 th, Vanguard II March 17, 1958 R.I.P. John Backus March 17, 2007 Copyright
More informationSince 1998, AT&T invested more than $35 billion to support customer needs in data, Internet protocol (IP), local and global services.
At The AT&T Overview AT&T Corp. is the industry leader in data, voice, and video communications, serving more than 4 million businesses and 50 million consumer customers worldwide. Backed by the research
More informationKick starting science...
Computer ing (TDDD63): Part 1 Kick starting science... Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/ What do you have in the future? What do you have in the future? How does it keep
More informationStatus Report on IP/Telecommunications Interworking
GSC#5/RAST#8 Williamsburg, Virginia, USA 23-26 August 1999 GSC5 (99) 32 SOURCE: TITLE: Committee T1 Status Report on IP/Telecommunications Interworking AGENDA ITEM: 10.6 DOCUMENT FOR: Decision Discussion
More informationBlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
More informationAdvanced Security and Mobile Networks
Advanced Security and Mobile Networks W.Buchanan (1) 3. Encryption 4. Forensic Computing Advanced Security and Mobile Networks: Learning Outcomes: 2. IDS 1. Network Security 5. Software Security 6. Network
More informationwhitepaper Cloud Servers: New Risk Considerations
whitepaper Cloud Servers: New Risk Considerations Overview...2 Cloud Servers Attract e-criminals...2 Servers Have More Exposure in the Cloud...3 Cloud Elasticity Multiplies Attackable Surface Area...3
More informationUnified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government
More informationCourse Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
More informationColumbia - Verizon Research Securing SIP: Scalable Mechanisms For Protecting SIP-Based Systems
Columbia - Verizon Research Securing SIP: Scalable Mechanisms For Protecting SIP-Based Systems Henning Schulzrinne Eilon Yardeni Somdutt Patnaik Columbia University CS Department Gaston Ormazabal Verizon
More informationA Systems Engineering Approach to Developing Cyber Security Professionals
A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.
More informationJort Kollerie SonicWALL
Jort Kollerie Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential
More informationIP/Optical integration & Management. WDM Stuff AKA. Sami COPYRIGHT 2013 ALCATEL-LUCENT. ALL RIGHTS RESERVED.
WDM Stuff AKA. Sami IP/Optical integration & Management BEYOND 100G FIRST TO MARKET IN 400Gb/s PSE Year 2010 2012 Speed 100 Gb/s 400 Gb/s Line rates 40G, 100G 40G, 100G, 200G, 400G Capacity 8.8T >23T Reach
More informationPerformance Management for Next- Generation Networks
Performance Management for Next- Generation Networks Definition Performance management for next-generation networks consists of two components. The first is a set of functions that evaluates and reports
More informationCommunications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise
Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise The Changing Landscape IP-based unified communications is widely deployed in enterprise networks, both for internal calling
More informationCONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
More informationCarrier Ethernet SLAs Technology Advancements to Differentiate and Improve Operational Efficiency
Carrier Ethernet SLAs Technology Advancements to Differentiate and Improve Operational Efficiency May 2011 ABSTRACT High-capacity, low-latency connectivity is important for the new generation of Ethernet-based
More informationWhat s New and What s Next in Cable Wholesale? Monday, March 17, 2014 10:15-11 a.m.
What s New and What s Next in Cable Wholesale? Monday, March 17, 2014 10:15-11 a.m. Moderator: Sean Buckley, Senior Editor, FierceTelecom Speakers: Jeremy Bye, Vice President, Cox Business Carrier and
More informationMRV EMPOWERS THE OPTICAL EDGE.
Pro-Vision Service Delivery Software MRV EMPOWERS THE OPTICAL EDGE. WE DELIVER PACKET AND OPTICAL SOLUTIONS ORCHESTRATED WITH INTELLIGENT SOFTWARE TO MAKE SERVICE PROVIDER NETWORKS SMARTER. www.mrv.com
More informationTransport SDN - Clearing the Roadblocks to Wide-scale Commercial
Transport SDN - Clearing the Roadblocks to Wide-scale Commercial Vishnu Shukla OIF President Verizon, USA OFC Los Angeles, March 25, 2015 Changing Role of Transport Networks A new kind of business customer
More informationAlcatel-Lucent 1850 TSS-3 Transport Service Switch. A versatile network termination unit
Alcatel-Lucent Transport Service Switch A versatile network termination unit The Alcatel-Lucent 1850 Transport Service Switch (TSS-3) is a carriergrade network termination unit (NTU). Providing a rich
More information13 Ways Through A Firewall
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
More informationAvailability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013
the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered
More informationCMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
More informationOverview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
More informationUnified Subsea-Terrestrial Mesh Networking the New Normal
Unified Subsea-Terrestrial Mesh Networking the New Normal Anuj Malik, Wayne Wauford 1 2013 Infinera Why Unified Network Architecture? Growing complexity DWDM. OXC. Routers Metro. LH. Submarine Globalization
More information2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
More informationState of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
More informationConnection-oriented Ethernet (COE) Combining the Reliability, Performance, and Security of SONET with the Flexibility and Efficiency of Ethernet
Connection-oriented ernet (COE) Combining the Reliability, Performance, and Security of SONET with the Flexibility and Efficiency of ernet Topics Just what is connection-oriented ernet (COE) anyway? Fundamental
More informationEnterprise Mobility Empowering the Mobile Workforce
Enterprise Mobility Empowering the Mobile Workforce 1 Outline Why Mobility? Describing the benefits of using mobile & wireless technologies Mobile and Wireless Challenges Pointing new/unaddressed challenges
More informationEffective Defense in Depth Strategies
Honeywell.com 2014 Honeywell Users Group Asia Pacific Effective Defense in Depth Strategies for Industrial Systems 1 Document control number Honeywell Proprietary Honeywell.com Chee Ban, Ngai About the
More informationHOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
More informationThe Century of Infinite Bandwidth. Simon C. Lin Computing Centre, Academia Sinica Taipei, Taiwan January 2001 sclin@sinica.edu.tw
The Century of Infinite Bandwidth Simon C. Lin Computing Centre, Academia Sinica Taipei, Taiwan January 2001 sclin@sinica.edu.tw Popular View of Internet Global Internet Traffic grows 10% to 12% per month
More informationUK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008
UK Networks & Security An Overview Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008 Objectives The structure of your public communication networks The threat landscape these networks face
More informationBroadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro
Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro Copyright Virgil Dobrota 2007-2008, All rights reserved 1 Course 12 - Outline 46. NGN Next Generation
More informationKeyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
More informationFailsafe Protection for Utility Critical Infrastructure
Failsafe Protection for Utility Critical Infrastructure Introduction PUCs maintain a crucial part of the nation s CI that provide essential services to the public, business and government. Reliable CI
More informationDEPLOYING VoIP SECURELY
DEPLOYING VoIP SECURELY Everyone knows that Voice-over-IP (VoIP) has been experiencing rapid growth. Even still, you might be surprised to learn that: 10% of all voice traffic is now transmitted with VoIP
More informationOTN, MPLS, and Control Plane Strategies
Global Service Provider Survey Excerpts: OTN, MPLS, and Control Plane Strategies By Andrew Schmitt Principal Analyst, Optical Infonetics Research SUMMARY: OTN SWITCHING POISED TO GO MAINSTREAM OTN switching
More informationXO Network Evolution Overview. Randolph C. Nicklas CTO & SVP Engineering XO Communications
XO Network Evolution Overview Randolph C. Nicklas CTO & SVP Engineering XO Communications About XO Communications Leading nationwide provider of data and IP services Comprehensive portfolio of communications,
More informationNeed for Signaling and Call Control
Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice
More informationETSI TR 101 303 V1.1.2 (2001-12)
TR 101 303 V1.1.2 (2001-12) Technical Report Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) Release 3; Requirements definition study; Introduction to service and network
More informationBotNets- Cyber Torrirism
BotNets- Cyber Torrirism Battling the threats of internet Assoc. Prof. Dr. Sureswaran Ramadass National Advanced IPv6 Center - Director Why Talk About Botnets? Because Bot Statistics Suggest Assimilation
More informationEvolution to Consolidated Network Layers
Evolution to Consolidated Network Layers EPF 10 Madrid, September 2015 Chris Cousins BTI Systems ccousins@btisystems.com Areas of Network Integration Data Plane Traditionally one technology choice per
More informationWhite Paper. Requirements of Network Virtualization
White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction
More informationMaximizing the Impact of Optical Technology OFC/NFOEC 2007
Maximizing the Impact of Optical Technology OFC/NFOEC 2007 Mark Wegleitner Senior VP Technology, CTO Verizon March 27, 2007 Traffic Growth 2000 Video downloads 1500 1000 700 600 500 400 300 200 100 0 0
More informationVOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
More informationReview of Industry Trends & Forecasts
Review of Industry Trends & Forecasts!" # $% & ' ( ) "" (!% How many squares to you see? Answer? *+, -*./ *.0 #*12 Answer? *+, -*./ *.03 #*12 How many squares to you see? /4/5+.4.5/ 14152 +4+5+, Changing
More informationIn This Issue: System Upgrades Edition
Voice of the Industry 73 n o v 2013 ISSN 1948-3031 System Upgrades Edition In This Issue: The Road to Upgrades Upgrading Cables Systems: An Opportunity to Turn Point-to-Point Links into More Global Networks
More informationHow To Create An Intelligent Infrastructure Solution
SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure
More informationTransport SDN Directions. March 20, 2013 Lyndon Ong Ciena lyong@ciena.com
Transport SDN Directions March 20, 2013 Lyndon Ong Ciena lyong@ciena.com SDN Potential Benefits of Transport SDN SDN Benefit Transport Network Impact Network Utilization Application-aware optimization
More informationNetwork Security. Vorlesung Kommunikation und Netze SS 10 E. Nett
Network Security Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers!
More informationIPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
More informationIncident Response 101: You ve been hacked, now what?
Incident Response 101: You ve been hacked, now what? Gary Perkins, MBA, CISSP Chief Information Security Officer (CISO) Information Security Branch Government of British Columbia Agenda: threat landscape
More informationBlue 102. IP Service Architecture Futures. Geoff Huston May 2000
Blue 102 IP Service Architecture Futures Geoff Huston May 2000 Next Wave IP Services Service Requirements Connectivity service for customer-operated routers Service payload is IP packet High peak carriage
More informationChapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
More informationSIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
More informationObjectives for Service Provider Shared Transport of 802.3 Higher Speed Ethernet
Objectives for Service Provider Shared Transport of 802.3 Higher Speed Ethernet George Young AT&T george_young@labs.att.com IEEE 802.3 HSSG - November, 2006 802.3 HSE MAN/WAN Transport Issues 802.3 HSE
More informationVirtualized Converged Data Centers & Cloud how these trends are effecting Optical Networks
Virtualized Converged Data Centers & Cloud how these trends are effecting Optical Networks Todd Bundy Director, Global Alliances-Enterprise ADVA Optical Networking tbundy@advaoptical.com 203-746-8060 Connecting
More informationSecurity Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
More informationTelecom Security for Olympic Events
Telecom Security for Olympic vents Prepared for: 2006 CQR Conference Contact: John Kimmins jkimmins@telcordia.com June 7, 2006 nformation Sensitivity Axis Services Axis National Security Multi-Dimensional
More informationCyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
More informationConverged Private Networks. Supporting voice and business-critical applications across multiple sites
Converged Private Networks Supporting voice and business-critical applications across multiple sites Harness converged voice and high-speed data connectivity MPLS-based WAN solution that supports voice
More informationDraft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
More informationWhitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
More informationR e v o l u t i o n i z i n g Broadband Services with GPON
R e v o l u t i o n i z i n g Broadband Services with GPON Higher Performance at a Lower Cost Service providers face intense competition to provide triple-play services in today s broadband access markets.
More informationHow To Use Connection-Oriented Ether (Coe) For Cloud Services
Connection-Oriented Ethernet for Delivery of Private Cloud Services Ralph Santitoro Director of Carrier Ethernet Market Development Ralph.Santitoro@us.Fujitsu.com February 23, 2012 Contents What problem
More informationComplete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
More informationWhat Applications Can be Deployed with Software Defined Elastic Optical Networks?
What Applications Can be Deployed with Software Defined Elastic Optical Networks? Yongli Zhao State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications
More informationa) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
More informationGlobal Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity
More informationBroadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26
Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next
More information13 Ways Through A Firewall What you don t know will hurt you
Scientech 2013 Symposium: Managing Fleet Assets and Performance 13 Ways Through A Firewall What you don t know will hurt you Andrew Ginter VP Industrial Security Waterfall Security Solutions andrew. ginter
More informationHigh speed Ethernet WAN: Is encryption compromising your network?
High speed Ethernet WAN: Is encryption compromising your network? Trademark: 2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names
More information