Mail Archive and informal PPVPN server
|
|
|
- Heather Norton
- 10 years ago
- Views:
Transcription
1 Chair(s): Rick Wilder Mailing List Marco Carugi Discussion: (Un)Subscribe: (UN)SUBSCRIBE ppvpn in the body Sorry : still problem of automatic replies for the sender Sorry : not yet a good solution for spam control Mail Archive and informal PPVPN server WG meeting minutes and presentations, ITU docs Yokohama agenda with clickable IDs
2 Rick couldn t be here today Minute taker : Ananth Nagarajan All : please circulate the blue sheets Speakers please : sign the specific paper just overview of IDs, focus on issues and future steps send me your presentation (proceedings, PPVPN informal server)
3 DONE : Formulate a plan, approach SPs for input on scaling, other reqts Begin discussion of framework, requirements First set of candidate approaches, begin discussion against requirements Begin discussion of Applicability Statements (AS) March 02 : Submit L3 framework, L3 reqts -> Info RFCs Submission in June : IESG review now, first comments received on the requirements draft NOT DONE : May 02 : Submit L2 reqts to IESG -> Info RFC May 02 : Begin submit L3 approaches & related AS Aug 02 : Submit L2 framework -> info RFC Aug 02 : Begin submit L2 approaches & related AS Dec 02: Charter update or WG disband MILESTONES will be updated after the meeting
4 L3 Requirements / L3 Framework draft-ietf-ppvpn-requirements-04.txt under IESG review draft-ietf-ppvpn-framework-05.txt under IESG review New WG documents after Minneapolis Applicability Statements (guidelines, 2547, VR) -> Ananth draft-kuhawara-cl-tunneling-vpn-00.txt -> Muneyoshi IESG has referred this ID to PPVPN (Info RFC request from authors), work completion and issues resolution before decision Expired WG documents draft-ietf-ppvpn-l2vpn-00.txt : integrated in L2 framework draft-ietf-ppvpn-{rfc2917bis-00, corevpn-disc-00, hiervpn-corevpn-00}.txt WG documents with status in evolution draft-ietf-ppvpn-ce-based-02.txt : evolution to a solution document -> Jeremy
5 First IESG comments on L3 reqts ID MUST/SHOULD/MAY's to be normalised To provide/enhance requirements for the VPN membership discovery mechanisms, Internet transparency, routing scalability and stability, address overlapping management In a number of places : CE-based vs PE-based scenarios : the document reads biased towards the PE-based solution. PE-based scenario described in a way that presupposes the solution I ll inform PPVPN about specific comments as soon as I ll receive them
6 According to my «pragmatic proposal» in the L2 space (mid June) draft-andersson-ppvpn-l2-framework-02.txt draft-andersson-ppvpn-metrics-01.txt draft-augustyn-ppvpn-l2vpn-requirements-00.txt draft-andersson-ppvpn-terminology-01.txt (some alignment necessary) draft-luciani-ppvpn-vpn-discovery-02.txt (to align with bgp-autodiscovery) No progress expected soon on L2 vertical solutions Other possible WG documents (according to meeting and list discussion) draft-bonica-l3vpn-auth-03.txt
7 Some problems for low participation of some team members (in L2 solution DT) in this last period commitment to active participation is necessary After some exchanges (AD, SPs, L2 DT) these last two last days, PPVPN Service requirements team reactivated Just Providers in this phase a number of Providers from the initial L3 Reqts team plus other Providers Enhancements of current Reqts (answer to IESG comments) Umbrella Requirements document (common L3 and L2 reqts) improvement of L3-specific and L2-specific reqts (with respective editors) some additional requirements already there input on protocol requirements for the analysis of the (L2) solution space Enhancement of current metrics draft criteria from a service user perspective for the candidate L2 solution choice September 10th as initial target for the output
8 PPVPN Framework : will see soon according to IESG comments Currently the Editors in charge Applicability Statements (L3) : will continue its work Guidelines to be progressed AS-specific IDs (CE-based IPSec, 2547bis, VR) to be progressed review also according to new input on requirements Requirements for PPVPN discovery schemes : CLOSED CE-based IPSec solution(s) DT : no plan for an official team low activity as a (informal) team in this last period it will not be formed unless emerging needs
9 Ex-L2 solution+vpls reqts teams: not official life as a team Compromise for progress solution work and consider IESG input (reqts first). Pure functional work not linked with existing solutions was the ideal target. Objectives of the group in this first period (September 10th) (extended L2 list) improve the L2 framework (editor Loa Andersson) and agree on terminology restructure the main identified solutions according to a functional decomposition agree on decomposition and common structure of the solution documents (including considerations on signaling discovery interactions etc.) new vertical solutions should be aligned with this structure way to identify missing pieces, discuss tradeoffs and functional choices submit the various vertical solution documents in this new shape (complete the classification of the L2 various proposals) 2nd phase (September 10- Atlanta deadline) (little teams around each editor?) consider the input from requirements team (reqts, metrics) review (and improve) the vertical solutions (possible convergences, issues) produce a list of candidate vertical solutions: progress to WG documents Atlanta progress each related AS in parallel
10 Need to identify them (but others might come) For VPWS For VPLS (For IPLS) A possible set of vertical solutions (not all aligned in terms of covered functions) my pragmatic proposal of L2 WG docs in mid-june
11 After discussion at the PWE3 meeting Scott s advice to keep it in PWE3 for PW maintenance stuff All related VPN functionalities to be discussed in PPVPN Need to clarify better how this will run in practice (draft submission etc.) Need to have a strong cooperation between PPVPN and PWE3 in order to progress in parallel (aligned time schedule), avoiding divergencies and inefficient work
12 2547 and VR solution documents : no recent updates listed the necessary protocol actions all requirements for extensions or new protocols where present, solution proposal ADs will assign to appropriate WGs (if any) for review and/or spec the related AS progress (possible review according to new requirements) some specific documents still in progress (ex. CE-to-CE authentication) how to manage new specific documents (ex. multicast) 2547 and VR documents not aligned in terms of functional specifications CE-based IPSec VPN solution under progress, progress of related AS in parallel schedule for standard track to be discussed
13 PPVPN terminology PPVPN VPN-ID? (draft-ouldbrahim-ppvpn-gid-00 etc.) L2 IPLS and L2 Interworking, alignment with existing bridging specs Multicast (framework ID to WG document?, work on solutions) Quality of service for PPVPNs (initial draft today) PPVPN Management (initial draft today) Security framework?
14 ITU-T activity on L1/OVPNs Q11/13, Q12/15, Q14/15 joint meeting May, Geneva Identified the context of SG13-SG15 cooperation First work items : Reference model, service definition and terminology, service requirements and architecture, scenarios Q11/13 meeting - July, Chitose (Japan) Initial contributions on service scenarios, service definition, service requirements and architecture Progress expected in October 02 (SG13, SG13 meetings) version 01 of new draft Recommendation IETF guys invited as individual contributors First (informal) check in December (initial input to IETF?) Intermediate step : initial Draft document (when ready) could be made available for IETF folks on the informal PPVPN page (plus ad-hoc mailing list)
15 L3 requirements and Framework IDs : Info RFCs < 11/02? Layer 3 VPN solutions : WG Last Call for 2547 and VR 11/02 WG doc for CE-based IPSec 11/ and VR MIBs Last Call >= 11/02 AS for Layer 3 VPNs : WG Last Call for 2547 and VR 11/02 WG doc for CE-based IPSec 11/02 NOTE : slide not presented in Yokohama
16 L2 Requirements : WG Last Call 10/02 L2 Framework : WG Last Call 10/02 L2 solutions : WG doc 11/02 WG Last Call 3/03 AS for Layer 2 VPNs : in parallel with L2 solutions NOTE : slide not presented in Yokohama
Internet Structure and Organization
Internet Structure and Organization Resources management and allocation [email protected] Introduction What s the Internet? Why organizations / bodies are needed? Define protocol specifications Agree
Network Virtualization Overlays (NVO3)
Network Virtualization Overlays (NVO3) NVO3 Meeting, IETF 89, London Benson Schliesser ([email protected]) Matthew Bocci ([email protected]) Note Well Any submission to the IETF intended
VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005
VPN taxonomy János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005 VPNs Definition: the capability of both private and public networks to support a communication infrastructure connecting geographically
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
Virtual Private Networks. Juha Heinänen [email protected] Song Networks
Virtual Private Networks Juha Heinänen [email protected] Song Networks What is an IP VPN? an emulation of private (wide area) network facility using provider IP facilities provides permanent connectivity between
MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. [email protected]
MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks [email protected] Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core
MPLS VPN Security Best Practice Guidelines
Security Best Practice Guidelines con 2006 May 24 2006 Monique Morrow and Michael Behringer Distinguished Consulting Engineer and Distinguished Systems Engineer Cisco Systems, Inc. [email protected] [email protected]
EAI Status. (Email Address Internationalization)
EAI Status (Email Address Internationalization) Ming-Cheng Liang TWNIC 1 Summary of TWNIC Activities 10~15% increase in the number of DN Introduce IDN in.tw level Security enforcement for DN Server (pass
Internet Bodies. [email protected]
Internet Bodies [email protected] Agenda Names, Acronyms in the Internet IETF organisation IESG, IAB, ISOC ICANN & IANA Standardisation process Standardisation compliance Internet Registries Requesting
VPN Technologies A Comparison
VPN Technologies A Comparison Matthew Finlayson, [email protected] Jon Harrison, [email protected] Richard Sugarman, [email protected] First issued February 2003 100
Peer-to-Peer (P2P) applications, including both P2P streaming and P2P
Description of Working Group Peer-to-Peer (P2P) applications, including both P2P streaming and P2P file-sharing applications, make up a large fraction of traffic in the Internet today. One way to reduce
Introduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE [email protected] Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
-SETTING ORGANIZATIONS
APPENDIX D STANDARD AND S TANDARD-S -SETTING ORGANIZATIONS William Stallings Copyright 2008 D.1 THE IMPORTANCE OF STANDARDS...2 D.2 INTERNET STANDARDS AND THE INTERNET SOCIETY...3 The Internet Organizations
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
Standards for VoIP in the Enterprise
Standards for VoIP in the Enterprise By: John Elwell ([email protected]) Rue du Rhône 114- CH-1204 Geneva - T: +41 22 849 6000 - F: +41 22 849 6001 - www.ecma-international.org Traditional Enterprise
What Is a Virtual Private Network?
C H A P T E R 1 What Is a Virtual Private Network? A virtual private network (VPN) allows the provisioning of private network services for an organization or organizations over a public or shared infrastructure
Jerry Ash AT&T [email protected] Bur Goode AT&T [email protected]. George Swallow Cisco Systems, Inc. [email protected]
Requirements for End-to-End VoIP Header Compression (draft-ash-e2e-voip-hdr-comp-rqmts-00.txt) End-to-End VoMPLS Header Compression (draft-ash-e2e-vompls-hdr-compress-01.txt) End-to-End VoIP Header Compression
Layer 2 and 3 Virtual Private Networks: Taxonomy, Technology, and Standardization Efforts
STANDARDS TOPICS Layer 2 and 3 Virtual Private Networks: Taxonomy, Technology, and Standardization Efforts Paul Knight, Nortel Networks Chris Lewis, Cisco Systems ABSTRACT Virtual private network services
A Resilient Path Management for BGP/MPLS VPN
A Resilient Path Management for BGP/MPLS VPN APNOMS2003 1 Introduction APNOMS2003 2 APNOMS2003 3 BGP/MPLS VPN Configuration MPLS/MP-iBGP VPN 1 VPN 1 VPN 2 VPN 2 BGP/MPLS VPN Overview BGP/MPLS Virtual Private
Carrier Class Transport Network Technologies: Summary of Initial Research
Carrier Class Transport Network Technologies: Summary of Initial Research This document is a summary of the JRA1 Task 1 Carrier Class Transport Network Technologies deliverable [DJ1.1.1], which presents
Message Authentication Signature Standards (MASS) BOF. Jim Fenton <[email protected]> Nathaniel Borenstein <[email protected]>
Message Authentication Signature Standards (MASS) BOF Jim Fenton Nathaniel Borenstein Agenda Introductions and Agenda Bashing (10 min) Scribe?? Overview of existing
Data Center Network Virtualisation Standards. Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair
Data Center Network Virtualisation Standards Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair May 2013 AGENDA 1. Why standardise? 2. Problem Statement and Architecture
Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt)
Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt) Jerry Ash AT&T [email protected] Bur Goode AT&T [email protected] Jim Hand AT&T [email protected] Raymond
HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University
HPSR 2002 Kobe, Japan Towards Next Generation Internet Bijan Jabbari, PhD Professor, George Mason University May 28, 2002 Overview! Scalability and Interoperability in Internet! Impediments in Deployment
Internet Standards - Emergency Services
Internet Standards - Emergency Services Hannes Tschofenig (Chair IETF ECRIT Working Group) Mail comments to [email protected] and/or [email protected]. Architectural Considerations Layer 7 VoIP, Inc.
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
SIP-H.323 Interworking
SIP-H.323 Interworking Phone (408) 451-1430 1762 Technology Drive Suite 124 Fax (408) 451-1440 San Jose CA 95110-1307 USA URL www.ipdialog.com Joon Maeng [email protected] SIP and H.323! IETF SIP! Session
Riverstone Networks. Carrier Ethernet Standards Progress. Igor Giangrossi Sr. Systems Engineer, CALA
Riverstone Networks Carrier Ethernet Standards Progress Igor Giangrossi Sr. Systems Engineer, CALA Agenda History Metro Ethernet Forum work IETF work IEEE work Conclusion 2 Ethernet Evolution What do we
Mobile IP Part I: IPv4
Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile
6lowpan security considerations
6lowpan security considerations Christian Schumacher [email protected] 6lowpan WG 64th IETF 7th of November, 2005 Disposition 6lowpan problem areas and scope Current security considerations IEEE802.15.4
Charter Text Network Design and Configuration
MIF Charter update proposal MIF WG Charter update proposal summary http://www.ietf.org/mail-archive/web/mif/current/msg02125.html Specific deliverables listed MPVD architecture document Requirement for
Junos MPLS and VPNs (JMV)
Junos MPLS and VPNs (JMV) Course No: EDU-JUN-JMV Length: Five days Onsite Price: $32500 for up to 12 students Public Enrollment Price: $3500/student Course Level JMV is an advanced-level course. Prerequisites
VoIP over MPLS & Voice Services over MPLS. Jim McEachern [email protected]
VoIP over & Voice Services over Jim McEachern [email protected] Voice Services over Standards IETF RFC 3032 () draft-ietf-pwe3-requirements-08.txt draft-ietf-pwe3-arch-07.txt and Frame Relay Alliance
Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division
Tackling the Challenges of MPLS VPN ing Todd Law Product Manager Advanced Networks Division Agenda Background Why test MPLS VPNs anyway? ing Issues Technical Complexity and Service Provider challenges
BUY ONLINE AT: http://www.itgovernance.co.uk/products/730
IPSEC VPN DESIGN Introduction Chapter 1: Introduction to VPNs Motivations for Deploying a VPN VPN Technologies Layer 2 VPNs Layer 3 VPNs Remote Access VPNs Chapter 2: IPSec Overview Encryption Terminology
ENUM: an Enabler for VoIP and Next Generation Services
ITU Workshop on Origin Identification and Alternative Calling Procedures (Geneva, Switzerland, 19-20(AM) 2012) ENUM: an Enabler for VoIP and Next Generation Services Steven D. Lind Senior Member of the
Project Report. IP Virtual Private Networks. Guidelines on IPVPN deployment: models, architectures and technologies.
Project Report IP Virtual Private Networks Guidelines on IPVPN deployment: models, architectures and technologies Editor: Gizella Kovacs, MATÁV Hungarian Telecommunications Company Ltd. (HT) Suggested
Standardization on Mobility Management Architectures and Protocols for All-IP Mobile Networks
Standardization on Mobility Management Architectures and Protocols for All-IP Mobile Networks This paper gives an overview of standardization activities on mobility management (MM) architectures and protocols
Datacom Services Description and their applications
Datacom Services Description and their applications What is data communication services? Data communication ( datacom ) is range of services that will help organise communication and data exchange between
Alcatel OmniPCX Enterprise R11 Supported SIP RFCs
Alcatel OmniPCX Enterprise R11 Supported SIP RFCs Product & Offer Large & Medium Enterprise Ref: 8AL020033225TCASA ed3 ESD/ Mid & Large Enterprise Product Line Management October 2013 OmniPCX Enterprise
Secure Network Design: Designing a DMZ & VPN
Secure Network Design: Designing a DMZ & VPN DMZ : VPN : pet.ece.iisc.ernet.in/chetan/.../vpn- PPTfinal.PPT 1 IT352 Network Security Najwa AlGhamdi Introduction DMZ stands for DeMilitarized Zone. A network
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
3GPP TS 24.623 V8.1.0 (2008-09)
TS 24.623 V8.1.0 (2008-09) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Extensible Markup Language (XML) Configuration Access Protocol
INTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 1/13 Mar del Plata, Argentina, 2-12 September 2009 Ref.:
ITU- T Focus Group Cloud Compu2ng
ITU- T Focus Group Cloud Compu2ng International Telecommunication Union 1 ITU-T FG Cloud Management & Structure Management team: Chairman: Victor Kutukov (Russia) Vice-Chairman: Jamil Chawki (France Telecom
Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN
Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN Product Overview Today s networked applications such as voice and video are accelerating the need
How To Manage Ipv6 Networks On A Network With Ipvv6 (Ipv6) On A Pc Or Ipv4 (Ip6) (Ip V6) Or Ip V6 ( Ipv5) ( Ip V5
IPv6 networks management [email protected] Contribs Bernard Tuy, Renater Simon Muyal, Renater Ralf Wolter, Cisco Patrick Grossetête, Cisco Munechika Sumikawa, Hitachi Patrick Paul, 6WIND Simon Muyal
Designing Cisco Network Service Architectures ARCH v2.1; 5 Days, Instructor-led
Designing Cisco Network Service Architectures ARCH v2.1; 5 Days, Instructor-led Course Description The Designing Cisco Network Service Architectures (ARCH) v2.1 course is a five-day instructor-led course.
Managed Incident Lightweight Exchange (MILE)
Managed Incident Lightweight Exchange (MILE) Overview and Particpation Kathleen Moriarty Global Lead Security Architect EMC Corporate CTO Office 1 Agenda IETF s Managed Incident Lightweight Exchange (MILE)
Group Encrypted Transport VPN
Group Encrypted Transport VPN Petr Růžička [email protected] Cisco Systems Czech Republic V Celnici 10, 117 21 Praha Abstract Today's networked applications, such as voice and video, are accelerating
Programming SIP Services University Infoline Service
Programming SIP Services University Infoline Service Tatiana Kováčiková, Pavol Segeč Department of Information Networks University of Zilina Moyzesova 20, 010 26 SLOVAKIA Abstract: Internet telephony now
Using Workflows in a Content Management System
Using Workflows in a Content Management System Hannon Hill Corporation 950 East Paces Ferry Road Suite 2440, Atlanta, GA 30326 www.hannonhill.com o: 678.904.6900 f: 678.904.6901 Table of Contents Workflow's
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
Designing and Developing Scalable IP Networks
Designing and Developing Scalable IP Networks Guy Davies Telindus, UK John Wiley & Sons, Ltd Contents List of Figures List of Tables About the Author Acknowledgements Abbreviations Introduction xi xiii
Preparatory Meeting for Phase 2 of Philippine National ENUM Trial
Preparatory Meeting for Phase 2 of Philippine National Trial IP Telephony Group Advanced Science and Technology Institute Department of Science and Technology December 12, 2005 NCC-CICT Dialing Scheme
Interconnecting Cisco Networking Devices, Part 2 Course ICND2 v2.0; 5 Days, Instructor-led
Interconnecting Cisco Networking Devices, Part 2 Course ICND2 v2.0; 5 Days, Instructor-led Course Description The Interconnecting Cisco Networking Devices, Part 2 (ICND2) v2.0 course provides entry-level
Network Virtualization for Large-Scale Data Centers
Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning
Network System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens
Nick Marly, Dominique Chantrain, Jurgen Hofkens Alcatel Francis Wellesplein 1 B-2018 Antwerp Belgium Key Theme T3 Tel : (+32) 3 240 7767 Fax : (+32) 3 240 8485 E-mail : [email protected] Tel : (+32)
Transporting PTP messages over MPLS networks using a link local addressing draft-jobert-tictoc-ptp-link-local-00 TICTOC WG
Transporting PTP messages over MPLS networks using a link local addressing draft-jobert-tictoc-ptp-link-local-00 TICTOC WG Sébastien Jobert France Télécom Orange IETF 83, Paris, 26/03/2012 Scope of the
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
How To Protect Your Network From Attack
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Internet (In)Security Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: [email protected]
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
MULTILINGUILIZATION STANDARD. Wael Nasr Director, I-DNS.Net
UNITED NATIONS ECONOMIC AND SOCIAL COUNCIL E Distr. LIMITED E/ESCWA/ICTD/2003/WG.2/12 2 June 2003 ORIGINAL: ENGLISH Economic and Social Commission for Western Asia Expert Group Meeting on Promotion of
How does Big Data disrupt the technology ecosystem of the public cloud?
How does Big Data disrupt the technology ecosystem of the public cloud? Copyright 2012 IDC. Reproduction is forbidden unless authorized. All rights reserved. Agenda Market trends 2020 Vision Introduce
Implementing Cisco IP Telephony & Video, Part 1
Course Code: CI-CIPTV1 Vendor: Cisco Course Overview Duration: 5 RRP: 2,320 Implementing Cisco IP Telephony & Video, Part 1 Overview Implementing Cisco IP Telephony & Video, Part 1 (CIPTV1) v1.0 is a five-day
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
200-101: Interconnecting Cisco Networking Devices Part 2 v2.0 (ICND2)
200-101: Interconnecting Cisco Networking Devices Part 2 v2.0 (ICND2) Course Overview This course provides students with the knowledge and skills to successfully install, operate, and troubleshoot a small
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects
Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects Fabien Castanier STMicroelectronics IPSO Promoter M2M Forum - Milan, May 20,
EAP-WAI Authentication Protocol
EAP-WAI Authentication Protocol draft-richard-emu-wai-00 Richard 2009-07-26 Stockholm, IETF 75th Preface WAPI is a WLAN security protocol and brought forward By a Standard Group in China. It was invited
Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**
Course: Duration: Price: $ 3,695.00 Learning Credits: 37 Certification: Implementing Cisco Service Provider Next-Generation Edge Network Services Implementing Cisco Service Provider Next-Generation Edge
"Charting the Course... Implementing Cisco IP Telephony & Video, Part 1 v1.0 ( CIPTV1 ) Course Summary
Description Course Summary Implementing Cisco IP Telephony & Video, Part 1 (CIPTV1) v1.0 is a five-day course that prepares the learner for implementing a Cisco Collaboration solution at a single-site
