Evolving Optical Transport Network Security

Size: px
Start display at page:

Download "Evolving Optical Transport Network Security"

Transcription

1 Evolving Optical Transport Network Security May 15, 2012 Prepared by: John Kimmins Executive Director Copyright 2012 All Rights reserved 1

2 Outline Overview of Optical Communications and Transport Networks Evolving Transport Network Technology Potential Security Issues Security Risk Management 2

3 Drivers for Optical Communications Exploding bandwidth demands Annual growth of 50% or more to support services such as 3G and 4G wireless (backhaul) Streaming video Cloud services On-line gaming Capacity of optical systems is hundreds of times greater than that of electrical or radio-wave systems Need for agility, scalability and sustainability to meet rising customer expectations Shift from relatively static TDM-based services to rapidly changing IP/Ethernet-based services 3

4 Optical Communications Stack Options Transported Traffic (voice, video, data) FDDI Ethernet SONET Fibre Channel Ethernet SONET Fibre Channel Ethernet SONET OTN Fibre Channel Inside Plant WDM (typically DWDM) Optical Fiber Optical Fiber Cable Outside Plant 4

5 Illustrative Physical Network View Core/Long-Haul (undersea and terrestrial) Distribution/Metro Access/ Last mile 5

6 Evolving Transport Network Technology - 1 Automatically Switched Optical Network (ASON) is an emerging control plane technology that Automates discovery and provisioning of network resources and connections Allows for customer control over optical network connections Permits dynamic policy-driven network control Transport network changes are initiated by a customer or management system Signaling controls the creation and removal of connections Customer connects to the transport plane through a physical interface and communicates with the control plane via a User Network Interface (UNI) 6

7 Evolving Transport Network Technology - 2 Automated provisioning allows for Dynamic bandwidth allocation based on demand Quick end-to-end connection setup and teardown Efficient rerouting and resource usage Reduced labor costs associated with manual tasks and customer/service provider interactions Time-efficient response to changing customer needs ASON also supports Connection protection and restoration Address and wavelength assignment Traffic engineering Many Quality of Service (QoS) levels Multiple types of traffic (though it may be optimized for IP) 7

8 ASON Architecture Interfaces Service demarcation points are where call control is provided Inter-domain interfaces are service demarcation points 8

9 ASON Network Interfaces UNI UNI-C UNI-N NE Provider A NE E-NNI NE Provider B UNI UNI-N NE UNI-C User-Network Interface (UNI) Separates the concerns of the user and provider Enables client-driven end-to-end service activation External Network-Network Interface (E-NNI) enables End-to-end service activation Multi-carrier and vendor inter-working Independence of survivability schemes for each domain Internal Network-Network Interface (I-NNI) supports Intra-domain connection establishment Explicit connection operations on individual switches I-NNI Domain 1 E-NNI E-NNI Domain 2 UNI and E-NNI are supported by a family of ITU-T and OIF signaling protocols I-NNI is considered proprietary 9

10 Growth of the Security Threats High Sophistication Low back doors disabling audits self-replicating code password guessing Sophistication Of Available Tools/Attacks Growing packet spoofing burglaries sniffers sweepers exploiting known vulnerabilities password cracking hijacking sessions stealth / advanced scanning techniques denial of service automated probes/scans graphic user interface network mgmt. diagnostics Supply Chain Stuxnet? Counterfeits cross site scripting Botnets Mobile Malware RSA Compromise Advanced Persistent Threat distributed attack tools www attacks

11 Emerging Risks & Impacts Increases the exposure of the core optical transport network With new user interface, unauthorized bandwidth requests may enable denial-of-service attacks New routing protocols may not be sufficiently protected and create network instability Network forensics may be more difficult in a dynamic environment Connections may be temporarily set up to support potential attacks and then disappear Gateway products will be emerging to mediate network access Testing of security features will be required to determine protection level 11

12 Security Risk Management Roadmap Assess Security Address risk Platforms, applications, NEs & interfaces Process flows Security architecture Security management Procurement Process Controls Vulnerability Mitigation Processes Security design Operations testing & turn-up New Services Rollout Controls process Vulnerability assessment Procedures Training Service testing & turn-up Threat & Vulnerability Monitoring Patch management Periodic Vulnerability assessments Training Current Network Infrastructure New Customer Services New Network Technology Insertion Evolving Network Infrastructure 12

13 Powerhouse Research. Practical Solutions. 13

Computer System Security Updates

Computer System Security Updates Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),

More information

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff

More information

Risk Assessment and Cloud Strategy Development: Getting it Right this Time!

Risk Assessment and Cloud Strategy Development: Getting it Right this Time! Risk Assessment and Cloud Strategy Development: Getting it Right this Time! Barbara Endicott-Popovsky, PhD University of Washington Center of Information Assurance and Cybersecurity Kirsten Ferguson-Boucher

More information

Worldwide Interoperability Demo On-Demand Ethernet Services. ECOC 2007 September 17-19 Berlin, Germany

Worldwide Interoperability Demo On-Demand Ethernet Services. ECOC 2007 September 17-19 Berlin, Germany Worldwide Interoperability Demo On-Demand Ethernet Services ECOC 2007 September 17-19 Berlin, Germany Ericsson In Optical Networking Established leader, with the vision and experience to realise Full Service

More information

Quelle sécurité dans une banque? " Sécurité des transactions électroniques sur Internet et KYC"

Quelle sécurité dans une banque?  Sécurité des transactions électroniques sur Internet et KYC Quelle sécurité dans une banque? " Sécurité des transactions électroniques sur Internet et KYC" Genève- UIPF 27 Nov.2010 La mission de WISeKey est de faciliter la croissance économique globale en sécurisant

More information

Relationship between SMP, ASON, GMPLS and SDN

Relationship between SMP, ASON, GMPLS and SDN Relationship between SMP, ASON, GMPLS and SDN With the introduction of a control plane in optical networks, this white paper describes the relationships between different protocols and architectures. Introduction

More information

Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities

Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities 16 Oct 2012 Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities Bradford Willke Cyber Security Advisor, Mid Atlantic Region National Cyber Security Division (NCSD) Office

More information

Data Platform Security. Vinod Kumar Technology Evangelist www.extremeexperts.com http://blogs.sqlxml.org/vinodkumar

Data Platform Security. Vinod Kumar Technology Evangelist www.extremeexperts.com http://blogs.sqlxml.org/vinodkumar Data Platform Security Vinod Kumar Technology Evangelist www.extremeexperts.com http://blogs.sqlxml.org/vinodkumar Agenda Problem Statement Security for Enterprise Security Defaults - Vulnerabilities Configurations

More information

OPTICAL TRANSPORT NETWORKS

OPTICAL TRANSPORT NETWORKS OPTICAL TRANSPORT NETWORKS EVOLUTION, NOT REVOLUTION by Brent Allen and James Rouse Nortel Networks, OPTera Metro Solutions KANATA, Canada This paper describes how the deployment today of an Optical Network

More information

Securing SIP Trunks APPLICATION NOTE. www.sipera.com

Securing SIP Trunks APPLICATION NOTE. www.sipera.com APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)

More information

HACKING RELOADED. Hacken IS simple! Christian H. Gresser cgresser@nesec.de

HACKING RELOADED. Hacken IS simple! Christian H. Gresser cgresser@nesec.de HACKING RELOADED Hacken IS simple! Christian H. Gresser cgresser@nesec.de Agenda About NESEC IT-Security and control Systems Hacking is easy A short example where we currently are Possible solutions IT-security

More information

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.

More information

Transport SDN Toolkit: Framework and APIs. John McDonough OIF Vice President NEC BTE 2015

Transport SDN Toolkit: Framework and APIs. John McDonough OIF Vice President NEC BTE 2015 Transport SDN Toolkit: Framework and APIs John McDonough OIF Vice President NEC BTE 2015 Transport SDN Toolkit Providing carriers with essential tools in the Transport SDN toolkit How to apply SDN to a

More information

DDos. Distributed Denial of Service Attacks. by Mark Schuchter

DDos. Distributed Denial of Service Attacks. by Mark Schuchter DDos Distributed Denial of Service Attacks by Mark Schuchter Overview Introduction Why? Timeline How? Typical attack (UNIX) Typical attack (Windows) Introduction limited and consumable resources (memory,

More information

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments Contents Foreword Preface Acknowledgments 1 Introduction 1 1.1 Motivation for Network Convergence 1 1.2 The Core Network 2 1.3 Legacy Service Requirements 4 1.4 New Service Requirements 5 1.5 Architectures

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Beyond the Noise: More Complex Issues with Incident Response

Beyond the Noise: More Complex Issues with Incident Response Beyond the Noise: More Complex Issues with Incident Response IFIP WG Meeting, June 30, 2006 David Dittrich Center for Information Assurance and Cybersecurity/ The Information School University of Washington

More information

The Evolution of the Central Office

The Evolution of the Central Office The Gateway to Learning an All IP Network The Evolution of the Central Office -Where did all the DS-1s go? Presented by: Steven Senne, P.E. APRIL 27-30, 2014 ACE/RUS SCHOOL AND SYMPOSIUM 1 The New Central

More information

ASON for Optical Networks

ASON for Optical Networks 1/287 01-FGC1010609 Rev B ASON for Optical Networks Ericsson Control Plane for DWDM Optically Switched Networks ASON for MHL3000 Introduction The growing demand for multiple service is changing the network

More information

Cybersecurity Strategic Talent Management. March, 2012

Cybersecurity Strategic Talent Management. March, 2012 Cybersecurity Strategic Talent Management March, 2012 Cyber Operations - Starts with People Exploit Intel Attack Cyber Operations Defend Enablers 2 Talent Management Challenge Mission: Attract, Develop,

More information

Carrier Ethernet: New Game Plan for Media Converters

Carrier Ethernet: New Game Plan for Media Converters Introduction IEEE Std. 802.3ah, also referred to as Ethernet in the First Mile (EFM) standard, has a well established name within the industry today. It lays out ground rules for implementing Ethernet

More information

GMPLS Network Management: Challenges and Solutions

GMPLS Network Management: Challenges and Solutions GMPLS Network Management: Challenges and Solutions Thomas D. Nadeau Technical Leader 1 Fundamental Question Why is network management so important to the success of GMPLS/UCP? 2 Agenda Motivations and

More information

NETWORK SECURITY ASPECTS & VULNERABILITIES

NETWORK SECURITY ASPECTS & VULNERABILITIES NETWORK SECURITY ASPECTS & VULNERABILITIES Luis Sousa Cardoso FIINA President Brdo pri Kranju, 19. in 20. maj 2003 1 Background Importance of Network Explosive growth of computers and network - To protect

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Sudden Impact: How Cloud Services Affect the Network and Drive Business Transformation. Monday, March 11, 2013 2:30-3:15 p.m.

Sudden Impact: How Cloud Services Affect the Network and Drive Business Transformation. Monday, March 11, 2013 2:30-3:15 p.m. Sudden Impact: How Cloud Services Affect the Network and Drive Business Transformation Monday, March 11, 2013 2:30-3:15 p.m. PLEASE SILENCE YOUR CELL PHONES THANK YOU! Moderator: Eric Clelland, CMO and

More information

OIF Activities in Transport SDN

OIF Activities in Transport SDN OIF Activities in Transport SDN Jonathan Sadler Vice Chairman OIF Technical Committee Coriant, USA Light Reading Big Telecom Event Chicago, June 16 Outline Premise Transport Control Systems Past Experiences

More information

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media IT 4823 Information Security Concepts and Administration March 17 Network Threats Notice: This session is being recorded. Happy 50 th, Vanguard II March 17, 1958 R.I.P. John Backus March 17, 2007 Copyright

More information

Since 1998, AT&T invested more than $35 billion to support customer needs in data, Internet protocol (IP), local and global services.

Since 1998, AT&T invested more than $35 billion to support customer needs in data, Internet protocol (IP), local and global services. At The AT&T Overview AT&T Corp. is the industry leader in data, voice, and video communications, serving more than 4 million businesses and 50 million consumer customers worldwide. Backed by the research

More information

Kick starting science...

Kick starting science... Computer ing (TDDD63): Part 1 Kick starting science... Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/ What do you have in the future? What do you have in the future? How does it keep

More information

Status Report on IP/Telecommunications Interworking

Status Report on IP/Telecommunications Interworking GSC#5/RAST#8 Williamsburg, Virginia, USA 23-26 August 1999 GSC5 (99) 32 SOURCE: TITLE: Committee T1 Status Report on IP/Telecommunications Interworking AGENDA ITEM: 10.6 DOCUMENT FOR: Decision Discussion

More information

BlackRidge Technology Transport Access Control: Overview

BlackRidge Technology Transport Access Control: Overview 2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service

More information

Advanced Security and Mobile Networks

Advanced Security and Mobile Networks Advanced Security and Mobile Networks W.Buchanan (1) 3. Encryption 4. Forensic Computing Advanced Security and Mobile Networks: Learning Outcomes: 2. IDS 1. Network Security 5. Software Security 6. Network

More information

whitepaper Cloud Servers: New Risk Considerations

whitepaper Cloud Servers: New Risk Considerations whitepaper Cloud Servers: New Risk Considerations Overview...2 Cloud Servers Attract e-criminals...2 Servers Have More Exposure in the Cloud...3 Cloud Elasticity Multiplies Attackable Surface Area...3

More information

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

Columbia - Verizon Research Securing SIP: Scalable Mechanisms For Protecting SIP-Based Systems

Columbia - Verizon Research Securing SIP: Scalable Mechanisms For Protecting SIP-Based Systems Columbia - Verizon Research Securing SIP: Scalable Mechanisms For Protecting SIP-Based Systems Henning Schulzrinne Eilon Yardeni Somdutt Patnaik Columbia University CS Department Gaston Ormazabal Verizon

More information

A Systems Engineering Approach to Developing Cyber Security Professionals

A Systems Engineering Approach to Developing Cyber Security Professionals A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.

More information

Jort Kollerie SonicWALL

Jort Kollerie SonicWALL Jort Kollerie Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential

More information

IP/Optical integration & Management. WDM Stuff AKA. Sami COPYRIGHT 2013 ALCATEL-LUCENT. ALL RIGHTS RESERVED.

IP/Optical integration & Management. WDM Stuff AKA. Sami COPYRIGHT 2013 ALCATEL-LUCENT. ALL RIGHTS RESERVED. WDM Stuff AKA. Sami IP/Optical integration & Management BEYOND 100G FIRST TO MARKET IN 400Gb/s PSE Year 2010 2012 Speed 100 Gb/s 400 Gb/s Line rates 40G, 100G 40G, 100G, 200G, 400G Capacity 8.8T >23T Reach

More information

Performance Management for Next- Generation Networks

Performance Management for Next- Generation Networks Performance Management for Next- Generation Networks Definition Performance management for next-generation networks consists of two components. The first is a set of functions that evaluates and reports

More information

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise The Changing Landscape IP-based unified communications is widely deployed in enterprise networks, both for internal calling

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Carrier Ethernet SLAs Technology Advancements to Differentiate and Improve Operational Efficiency

Carrier Ethernet SLAs Technology Advancements to Differentiate and Improve Operational Efficiency Carrier Ethernet SLAs Technology Advancements to Differentiate and Improve Operational Efficiency May 2011 ABSTRACT High-capacity, low-latency connectivity is important for the new generation of Ethernet-based

More information

What s New and What s Next in Cable Wholesale? Monday, March 17, 2014 10:15-11 a.m.

What s New and What s Next in Cable Wholesale? Monday, March 17, 2014 10:15-11 a.m. What s New and What s Next in Cable Wholesale? Monday, March 17, 2014 10:15-11 a.m. Moderator: Sean Buckley, Senior Editor, FierceTelecom Speakers: Jeremy Bye, Vice President, Cox Business Carrier and

More information

MRV EMPOWERS THE OPTICAL EDGE.

MRV EMPOWERS THE OPTICAL EDGE. Pro-Vision Service Delivery Software MRV EMPOWERS THE OPTICAL EDGE. WE DELIVER PACKET AND OPTICAL SOLUTIONS ORCHESTRATED WITH INTELLIGENT SOFTWARE TO MAKE SERVICE PROVIDER NETWORKS SMARTER. www.mrv.com

More information

Transport SDN - Clearing the Roadblocks to Wide-scale Commercial

Transport SDN - Clearing the Roadblocks to Wide-scale Commercial Transport SDN - Clearing the Roadblocks to Wide-scale Commercial Vishnu Shukla OIF President Verizon, USA OFC Los Angeles, March 25, 2015 Changing Role of Transport Networks A new kind of business customer

More information

Alcatel-Lucent 1850 TSS-3 Transport Service Switch. A versatile network termination unit

Alcatel-Lucent 1850 TSS-3 Transport Service Switch. A versatile network termination unit Alcatel-Lucent Transport Service Switch A versatile network termination unit The Alcatel-Lucent 1850 Transport Service Switch (TSS-3) is a carriergrade network termination unit (NTU). Providing a rich

More information

13 Ways Through A Firewall

13 Ways Through A Firewall Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright

More information

Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013

Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013 the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Unified Subsea-Terrestrial Mesh Networking the New Normal

Unified Subsea-Terrestrial Mesh Networking the New Normal Unified Subsea-Terrestrial Mesh Networking the New Normal Anuj Malik, Wayne Wauford 1 2013 Infinera Why Unified Network Architecture? Growing complexity DWDM. OXC. Routers Metro. LH. Submarine Globalization

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

State of Texas. TEX-AN Next Generation. NNI Plan

State of Texas. TEX-AN Next Generation. NNI Plan State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...

More information

Connection-oriented Ethernet (COE) Combining the Reliability, Performance, and Security of SONET with the Flexibility and Efficiency of Ethernet

Connection-oriented Ethernet (COE) Combining the Reliability, Performance, and Security of SONET with the Flexibility and Efficiency of Ethernet Connection-oriented ernet (COE) Combining the Reliability, Performance, and Security of SONET with the Flexibility and Efficiency of ernet Topics Just what is connection-oriented ernet (COE) anyway? Fundamental

More information

Enterprise Mobility Empowering the Mobile Workforce

Enterprise Mobility Empowering the Mobile Workforce Enterprise Mobility Empowering the Mobile Workforce 1 Outline Why Mobility? Describing the benefits of using mobile & wireless technologies Mobile and Wireless Challenges Pointing new/unaddressed challenges

More information

Effective Defense in Depth Strategies

Effective Defense in Depth Strategies Honeywell.com 2014 Honeywell Users Group Asia Pacific Effective Defense in Depth Strategies for Industrial Systems 1 Document control number Honeywell Proprietary Honeywell.com Chee Ban, Ngai About the

More information

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest

More information

The Century of Infinite Bandwidth. Simon C. Lin Computing Centre, Academia Sinica Taipei, Taiwan January 2001 sclin@sinica.edu.tw

The Century of Infinite Bandwidth. Simon C. Lin Computing Centre, Academia Sinica Taipei, Taiwan January 2001 sclin@sinica.edu.tw The Century of Infinite Bandwidth Simon C. Lin Computing Centre, Academia Sinica Taipei, Taiwan January 2001 sclin@sinica.edu.tw Popular View of Internet Global Internet Traffic grows 10% to 12% per month

More information

UK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008

UK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008 UK Networks & Security An Overview Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008 Objectives The structure of your public communication networks The threat landscape these networks face

More information

Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro

Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania Virgil.Dobrota@com.utcluj.ro Copyright Virgil Dobrota 2007-2008, All rights reserved 1 Course 12 - Outline 46. NGN Next Generation

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

Failsafe Protection for Utility Critical Infrastructure

Failsafe Protection for Utility Critical Infrastructure Failsafe Protection for Utility Critical Infrastructure Introduction PUCs maintain a crucial part of the nation s CI that provide essential services to the public, business and government. Reliable CI

More information

DEPLOYING VoIP SECURELY

DEPLOYING VoIP SECURELY DEPLOYING VoIP SECURELY Everyone knows that Voice-over-IP (VoIP) has been experiencing rapid growth. Even still, you might be surprised to learn that: 10% of all voice traffic is now transmitted with VoIP

More information

OTN, MPLS, and Control Plane Strategies

OTN, MPLS, and Control Plane Strategies Global Service Provider Survey Excerpts: OTN, MPLS, and Control Plane Strategies By Andrew Schmitt Principal Analyst, Optical Infonetics Research SUMMARY: OTN SWITCHING POISED TO GO MAINSTREAM OTN switching

More information

XO Network Evolution Overview. Randolph C. Nicklas CTO & SVP Engineering XO Communications

XO Network Evolution Overview. Randolph C. Nicklas CTO & SVP Engineering XO Communications XO Network Evolution Overview Randolph C. Nicklas CTO & SVP Engineering XO Communications About XO Communications Leading nationwide provider of data and IP services Comprehensive portfolio of communications,

More information

Need for Signaling and Call Control

Need for Signaling and Call Control Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice

More information

ETSI TR 101 303 V1.1.2 (2001-12)

ETSI TR 101 303 V1.1.2 (2001-12) TR 101 303 V1.1.2 (2001-12) Technical Report Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) Release 3; Requirements definition study; Introduction to service and network

More information

BotNets- Cyber Torrirism

BotNets- Cyber Torrirism BotNets- Cyber Torrirism Battling the threats of internet Assoc. Prof. Dr. Sureswaran Ramadass National Advanced IPv6 Center - Director Why Talk About Botnets? Because Bot Statistics Suggest Assimilation

More information

Evolution to Consolidated Network Layers

Evolution to Consolidated Network Layers Evolution to Consolidated Network Layers EPF 10 Madrid, September 2015 Chris Cousins BTI Systems ccousins@btisystems.com Areas of Network Integration Data Plane Traditionally one technology choice per

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

Maximizing the Impact of Optical Technology OFC/NFOEC 2007

Maximizing the Impact of Optical Technology OFC/NFOEC 2007 Maximizing the Impact of Optical Technology OFC/NFOEC 2007 Mark Wegleitner Senior VP Technology, CTO Verizon March 27, 2007 Traffic Growth 2000 Video downloads 1500 1000 700 600 500 400 300 200 100 0 0

More information

VOICE OVER IP SECURITY

VOICE OVER IP SECURITY VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Review of Industry Trends & Forecasts

Review of Industry Trends & Forecasts Review of Industry Trends & Forecasts!" # $% & ' ( ) "" (!% How many squares to you see? Answer? *+, -*./ *.0 #*12 Answer? *+, -*./ *.03 #*12 How many squares to you see? /4/5+.4.5/ 14152 +4+5+, Changing

More information

In This Issue: System Upgrades Edition

In This Issue: System Upgrades Edition Voice of the Industry 73 n o v 2013 ISSN 1948-3031 System Upgrades Edition In This Issue: The Road to Upgrades Upgrading Cables Systems: An Opportunity to Turn Point-to-Point Links into More Global Networks

More information

How To Create An Intelligent Infrastructure Solution

How To Create An Intelligent Infrastructure Solution SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure

More information

Transport SDN Directions. March 20, 2013 Lyndon Ong Ciena lyong@ciena.com

Transport SDN Directions. March 20, 2013 Lyndon Ong Ciena lyong@ciena.com Transport SDN Directions March 20, 2013 Lyndon Ong Ciena lyong@ciena.com SDN Potential Benefits of Transport SDN SDN Benefit Transport Network Impact Network Utilization Application-aware optimization

More information

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett Network Security Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers!

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

Incident Response 101: You ve been hacked, now what?

Incident Response 101: You ve been hacked, now what? Incident Response 101: You ve been hacked, now what? Gary Perkins, MBA, CISSP Chief Information Security Officer (CISO) Information Security Branch Government of British Columbia Agenda: threat landscape

More information

Blue 102. IP Service Architecture Futures. Geoff Huston May 2000

Blue 102. IP Service Architecture Futures. Geoff Huston May 2000 Blue 102 IP Service Architecture Futures Geoff Huston May 2000 Next Wave IP Services Service Requirements Connectivity service for customer-operated routers Service payload is IP packet High peak carriage

More information

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------

More information

SIP Trunking Configuration with

SIP Trunking Configuration with SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL

More information

Objectives for Service Provider Shared Transport of 802.3 Higher Speed Ethernet

Objectives for Service Provider Shared Transport of 802.3 Higher Speed Ethernet Objectives for Service Provider Shared Transport of 802.3 Higher Speed Ethernet George Young AT&T george_young@labs.att.com IEEE 802.3 HSSG - November, 2006 802.3 HSE MAN/WAN Transport Issues 802.3 HSE

More information

Virtualized Converged Data Centers & Cloud how these trends are effecting Optical Networks

Virtualized Converged Data Centers & Cloud how these trends are effecting Optical Networks Virtualized Converged Data Centers & Cloud how these trends are effecting Optical Networks Todd Bundy Director, Global Alliances-Enterprise ADVA Optical Networking tbundy@advaoptical.com 203-746-8060 Connecting

More information

Security Issues with Integrated Smart Buildings

Security Issues with Integrated Smart Buildings Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern

More information

Telecom Security for Olympic Events

Telecom Security for Olympic Events Telecom Security for Olympic vents Prepared for: 2006 CQR Conference Contact: John Kimmins jkimmins@telcordia.com June 7, 2006 nformation Sensitivity Axis Services Axis National Security Multi-Dimensional

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

Converged Private Networks. Supporting voice and business-critical applications across multiple sites Converged Private Networks Supporting voice and business-critical applications across multiple sites Harness converged voice and high-speed data connectivity MPLS-based WAN solution that supports voice

More information

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that

More information

Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com

Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com 10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the

More information

R e v o l u t i o n i z i n g Broadband Services with GPON

R e v o l u t i o n i z i n g Broadband Services with GPON R e v o l u t i o n i z i n g Broadband Services with GPON Higher Performance at a Lower Cost Service providers face intense competition to provide triple-play services in today s broadband access markets.

More information

How To Use Connection-Oriented Ether (Coe) For Cloud Services

How To Use Connection-Oriented Ether (Coe) For Cloud Services Connection-Oriented Ethernet for Delivery of Private Cloud Services Ralph Santitoro Director of Carrier Ethernet Market Development Ralph.Santitoro@us.Fujitsu.com February 23, 2012 Contents What problem

More information

Complete Protection against Evolving DDoS Threats

Complete Protection against Evolving DDoS Threats Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion

More information

What Applications Can be Deployed with Software Defined Elastic Optical Networks?

What Applications Can be Deployed with Software Defined Elastic Optical Networks? What Applications Can be Deployed with Software Defined Elastic Optical Networks? Yongli Zhao State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity

More information

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26 Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next

More information

13 Ways Through A Firewall What you don t know will hurt you

13 Ways Through A Firewall What you don t know will hurt you Scientech 2013 Symposium: Managing Fleet Assets and Performance 13 Ways Through A Firewall What you don t know will hurt you Andrew Ginter VP Industrial Security Waterfall Security Solutions andrew. ginter

More information

High speed Ethernet WAN: Is encryption compromising your network?

High speed Ethernet WAN: Is encryption compromising your network? High speed Ethernet WAN: Is encryption compromising your network? Trademark: 2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names

More information