CSIR. Over NKN PIU, NKN
|
|
- Noel Gibbs
- 7 years ago
- Views:
Transcription
1 CSIR Virtual Private Network Over NKN PIU, NKN 1
2 NKN TOPOLOGY 2
3 3
4 Application Requiring High Bandwidth Virtual Laboratories Collaborative Mega Science Projects Innovative Info-Bio-Nano Experiments Non-invasive Medicare for Diseases like Cancer Diagnostic Domes as Public Health Centers in Rural Areas Country-wide Classroom University without Walls Voice Conferencing among Researchers Video Conferencing among Researchers On-line access to Electronic Resources 4
5 NKN Design Philosophy To build a scalable network, which can expand both in the Reach (spread (p in the country) and Speed. To be a common Network Backbone like national highway, wherein different categories of users shall be supported. 5
6 Features NKN High Capacity, Highly Scalable Backbone Provide Quality of Service (QoS) and Security Wide Geographical Coverage Common Standard Platform Bandwidth from Many NLD s Highly Reliable & Available by Design Test beds ( for various implementation) Dedicated edcatedand downed. 6
7 NKN CLOUD Research Labs CSIR/DAE/ISRO/ICAR Educational Institutions NTRO Cert-IN EDUSAT National Internet NKN Exchange MPL Points (NIXI) S INTERNET Clou ds Connections to Broad Band Clouds Global Networks (e.g. GEANT) National / State Data Centers/ Networks Fig-1 GENERIC MPLS CLOUD OF NKN 7
8 NKN offering MPLS VPN CSIR Orissa CSIR Rajasthan CSIR Delhi CSIR hyderabad VOD DNS MCU Server CSIR Roorkee CSIR Chennai ISP Internet Internet Gateway NKN MPLS - VPN Network Internet Gateway ISP Internet CSIR Guwahati CSIR Gujarat CSIR Kanpur CSIR Kharagpur CSIR Patna CSIR Mumbai Fig-2 CSIR VPN 8
9 What NKN will provide? Bandwidth Availability and reliability IP space/ Interface with the APNIC NOC and DC DR NOC and DC 24 X 7 Support operations support Common Services like Web/Mail/ MX/DNS etc. All the MPLS VPN V4 / V6 and L2 VPN support. Guidelines and Procedures to effectively use the NKN. Routing/ Switching equipment at the end node to connect to the NKN. 9
10 What will NKN provide? Contd. Internet bandwidth Interface with other networks ( EU-GRID and others.) Applications like Video on Demand would be hosted on the Data Center Any other PORTAL / APPLICATION is deemed fit to be kept at Data center of NKN for efficient usage 10
11 Criterion to join NKN Must be a Knowledge Creator Participate in any of the killer applications that is envisaged Minimum bandwidth interface will be 100 Mbps Must comply to the policies i of NKN IP Usage Policy Security Policy - Operations policy 11
12 What logistics are expected from End Nodes Space for equipments. ( Router/ switch/ ups/ Racks from NLD) Typically 12 X 12 kind of space. Air- Conditioned Environment UPS (5 KVA & 10 KVA Based on router supplied) 24 X 7 access to NKN personnel or persons authorized by NKN. Seating space for one NKN appointed person. 12
13 What logistics are expected from End Nodes Contd.. Safety of the equipments supplied under NKN. Cabling with in the user location for connecting to the NKN router. Right of Way with in the User Campus for cabling to be done by the long distance providers. Nodal Officer appointed will be the single point of interface for NKN. ( Passion to NKN) 13
14 What NKN will not provide? Training / Troubleshooting on applications which are run internally by the end user. Interfacing with the end nodes which are not directly connected to the NKN (this includes broadband users, any end node of other MPLS cloud) Campus LAN support / maintenance inside the End Nodes ( whether connected directly or indirectly to NKN) Addressing security issues inside the END NODES. 14
15 Start Using NKN by creating a VPN connecting all the CSIRs Objective: Objective: To enable CSIRs to advertise the exisiting public IP segments (leased from ISPs) through NKN so that NKN connected institutes can reach any of the advertised public IPs through NKN links rather than spin around through ISPs 15
16 NKN link already in the institute and the NKN router is presently configured as a MPLS PE. Assumption: The Virtual Classrooms are on the NKN IP segment. Normally, the Institute's s campus LAN segments are terminated at a Core Switch, typically installed in the Computer Centre (CC). Internet access is provided through Prxy/Firewall/UTM devices. The Institutes router (which is connected to ISP) shall be capable of peering a BGP session with NKN router and the Institute router shall announce public IP segments to this BGP session. This will help the other institutes in the NKN cloud to reach the public IPs (hence webserver and other content enabled services) through NKN link. 16
17 How Do I start using the link immediately: Currently, NKN provides IP segments from RFC 1918's 10.n.n.n. n n These IP segments could clash with the exisiting assigned segment in the Institutes and re-assigning of the NKN suggested segments may be a daunting task. However, for the specified projects, the NKN suggested IP segments can be assigned from the day one. Connect the NKN router to the Institute's gateway router. Configure the gateway router to do a BGP session with NKN router and announce the public segment (normally provided by the ISP). This link at the NKN router is configured to be in VRF instance called NKNGEN. The public IPs are announced through the NKN who are part of this VRF instance NKNGEN. This way every CSIR's can announce their public IP segments in NKN and hence all the Institutes which are part of the VRF NKNGEN can reach the respective CSIRs public segment through NKN. 17
18 How Do I start using the link immediately: Incase the NKN links to the Institutes t fails, theroutes (public segments) will automatically ceases to exist and reachability to the Institute's public segment falls back through ISP link. In case of NKN link failure the routes from the NKN CLOUD will cease to exist and thereby the gateway of the institutes will start using the Internet link that they have for normal browsing. This way the internet t is being delivered d throughh theexisting provider. To Achieve Fig-1 and Fig-3, and Fig-3 the CSIRs must connect the NKN router to the CC router and announce the IP number allocated to them either from the ISP ( currently providing the Internet) or ERNET to NKN. If the CSIR wants to announce some resource, then it can be made available to all the others in NKN. The resource can be kept at the CSIR itself or could be transferred to DATA CENTER proposed in NKN. 18
19 NKN EXISTING ISP NKN Router Placed inside the institute MAIL server Link between NKN CSIR GW Layer 3 switch Proxy server WWW server Virtual Class Room on NKN private IP Institute t Campus IP schema is not changed in the existing setup OSDD LAB with IP schema which already exists Fig 3 Inside the Institute 19
20 Internet Browsing Only using the NKN: Objective: Using Internet facility on an immediate basis through NKN. Refer Fig 4 20
21 How Do I start using Internet using the NKN: Assumption: The Public IP number provided by ISP deployed currently. In case the institute wants to have the internet facility from the NKN, then the following needs to be done: The proxy server must have the real IP provided to the institute as a part of NKN. This IP shall be advertised by the NKN to the Internet world and hence the browsing is made possible through the NKN link. During this, any failure in the NKN link will result in proxy not getting internet connectivity. The other resources like the web site / mail server etc will still use the ISP as the IP numbers belong to the ISP and has been leased out to the institute. Refer Fig 4 21
22 NKN EXISTING ISP NKN Router Placed inside the institute Link between NKN CSIR GW MAIL server WWW server GARUDA LAB with IP schema which already exists External Interface with NKN public IP Proxy server Virtual Class Room on NKN private IP Layer 3 switch Block N Proxy server Block 2 Institute t Campus IP schema is not changed in the existing setup Block 1 Fig 4 Using a Proxy with NKN ext IP for browsing purpose. 22
23 Using the NKN when the USER has PUBLIC IP from APNIC/ ARIN: That is: /24 or more from APNIC/ARIN 23
24 Using the NKN when USER has PUBLIC IP from APNIC/ ARIN: The following are the assumptions for scenario in (Fig5): User with public IP pool Multi-homing to NKN & other ISP with separate local routers (running BGP between them). USER Requirement Primary (NKN) ISP & Backup (non-nkn) ISP Exit/Entry via Primary or Backup on Primary Fails Solution for preferred exit point Mark updates from NKN only with higher local preference. Solution for preferred entry point Advertise self public pool with AS ( number of NKN itself) path prepend to other ISP only and to NKN have a ibgp session. NKN s Role Accept only end node s prefixes & filter Advertise to the Internet with the ISPs connected to NKN 24
25 NKN EXISTING ISP ibgp between the NKN CSIR GW MAIL server Institute has IP number (public) provided by APNIC / ARIN NKN Router Placed inside the institute External Interface with NKN public IP Proxy server Layer 3 switch Proxy server WWW server GARUDA LAB with IP schema which already exists Virtual Class Room on NKN private IP Block N Block 1 Block 2 Institute Campus IP schema is not changed in the existing setup Fig 5 institutes having their own PUBLIC IP from APNIC/ARI N 25
26 Fanning-Out NKN NKN PoPP PoPP Engineering i collège Poly-tech Egress NKN Router NKN Cloud Ingress NKN Router Some NLD providing connectivity Médical collège VPN Green Site DAE LAB Education community VPN Blue Site BIO TECH PE -NKN MAIN UNIVERSITY With IN CAMPUS Colleges/ dpts 26
27 Short Term Migrating to NKN LAB #1 NKN IP Address Scheme Internet Service Provider NKN IP Address Scheme LAB # NKN RESOURCE DATA CENTER Internet Service Provider NKN CLOUD Internet Service Provider LAB #2 NKN IP Address Scheme NKN IP Address Scheme LAB #3 27
28 Migrating to NKN Institute #1 NKN IP SCHEMA CWCR Internet Service Provider NKN IP SCHEMA CWCR Institute # NKN RESOURCE DATA CENTER Internet Service Provider NKN CLOUD Internet Service Provider Institute #2 NKN IP SCHEMA CWCR NKN IP SCHEMA CWCR Institute #3 28
29 Short Term Migration Each one of the closed user group can advertise the IP numbers through the NKN. ( It will be the Public IP given to the organisation by the ISP currently engaged.) A separate VRF will be created which will allow the organisation to browse the others in the closed user group. This will also provide Internet facility. Provision can also be made on a short term basis for public IP for the organisation from NKN to cater to the PUBLIC/ INTERNET demands. 29
30 Killer Applications Peer to Peer Collaboration Desktop Video Enterprise ERP Central Web Based Applications Library resources MOST IMPORTANTLY A DESIGN THAT CAN CATER TO FURTURE INOOVATIVE IDEAS 30
31 HOW TO CONNECT EXISTING GARUDA LAB TO NKN? 31
32 HOW TO CONNECT GARUDA LABS? GARUDA: It has been decided to provide the bandwidth to Garuda through NKN. It is important that the LAB taking part in the GARUDA project gets a link from the router provided to the institutions through NKN project. Suggestion: The LAB has to extend the link from the NKN router which in many cases will be in the Computer Center and in some cases it could be a part of some other project like ERNET PoP. The approximate distance is 0-2 KM in most cases. Connect the cable provided to the NKN router in the institute and Garuda LAB. ( responsibility of GARUDA) 32
33 ISP Reliance/Bharti/TATA New Delhi/Hyderabad Internet Gateway Primary For NKN NKN Tier 1/2/3 POP PE Router Institute PE ISP Backup Institute Network Tier 1/2/3 POP PE Routers NKN MPLS Backbone Tier 1/2 POP PE Router Proxy server MAIL server WWW server Tier 1 POP P Router GARUDA LAB Details within the INSTITUTE Internal Cabling Fig: 6 Connecting Garuda lab to NKN 33
34 THANK YOU For further information: Contact: 34
National Knowledge Network. Dr. B. K. Murthy Director & Head National Knowledge Network Division Ministry of Communications and IT Govt.
National Knowledge Network Dr. B. K. Murthy Director & Head National Knowledge Network Division Ministry of Communications and IT Govt. of India Contemporary INDIA Large and Complex Democracy More than
More informationDisaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
More informationIPv6 Addressing. ISP Training Workshops
IPv6 Addressing ISP Training Workshops 1 Where to get IPv6 addresses p Your upstream ISP p Africa n AfriNIC http://www.afrinic.net p Asia and the Pacific n APNIC http://www.apnic.net p North America n
More informationDD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA
DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in
More informationCHAPTER 6 DESIGNING A NETWORK TOPOLOGY
CHAPTER 6 DESIGNING A NETWORK TOPOLOGY Expected Outcomes Able to identify terminology that will help student discuss technical goals with customer. Able to introduce a checklist that can be used to determine
More informationEnterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy,
More informationISP Case Study. UUNET UK (1997) ISP/IXP Workshops. ISP/IXP Workshops. 1999, Cisco Systems, Inc.
ISP Case Study UUNET UK (1997) ISP/IXP Workshops ISP/IXP Workshops 1999, Cisco Systems, Inc. 1 Acknowledgements Thanks are due to UUNET UK for allowing the use of their configuration information and network
More informationAddress Scheme Planning for an ISP backbone Network
Address Scheme Planning for an ISP backbone Network Philip Smith Consulting Engineering, Office of the CTO Version 0.1 (draft) LIST OF FIGURES 2 INTRODUCTION 3 BACKGROUND 3 BUSINESS MODEL 3 ADDRESS PLAN
More informationOBJECTIVE. National Knowledge Network (NKN) project is aimed at
OBJECTIVE NKN AIMS TO BRING TOGETHER ALL THE STAKEHOLDERS FROM SCIENCE, TECHNOLOGY, HIGHER EDUCATION, HEALTHCARE, AGRICULTURE AND GOVERNANCE TO A COMMON PLATFORM. NKN is a revolutionary step towards creating
More informationMikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
More informationIndian NERN: ERNET. Presented by : Meharban Singh, ERNET India
Indian NERN: ERNET Presented by : Meharban Singh, ERNET India Presentation Outline ERNET India Introduction Networks established by ERNET India ERNET Network for Indian Grid GARUDA Network DAE - LHC grid
More informationUsing OSPF in an MPLS VPN Environment
Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest
More informationAdvanced BGP Policy. Advanced Topics
Advanced BGP Policy George Wu TCOM690 Advanced Topics Route redundancy Load balancing Routing Symmetry 1 Route Optimization Issues Redundancy provide multiple alternate paths usually multiple connections
More informationRouting in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks
Routing in Small Networks Internet Routing Overview AS, IGP,, BGP in small networks distance vector or link state protocols like RIP or OSPF can be used for dynamic routing it is possible that every router
More informationBGP1 Multihoming and Traffic Engineering
83950 Telecommunications Laboratory Course BGP1 BGP1 Multihoming and Traffic Engineering date & time student # name 1 2 bgp-tyo.tex,v 1.11 2005/04/18 14:09:14 ams Exp 1/17 Part I Home Assignment 1 General
More informationHow To Make A Network Secure
1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance
More informationLHCONE Site Connections
LHCONE Site Connections Michael O Connor moc@es.net ESnet Network Engineering Asia Tier Center Forum on Networking Daejeon, South Korea September 23, 2015 Outline Introduction ESnet LHCONE Traffic Volumes
More informationIP interconnect interface for SIP/SIP-I
Page INTERCONNECT SPECIFICATION Public 1 (7) IP interconnect interface for SIP/SIP-I 0 Document history... 2 1 Scope... 2 2 References... 2 3 Definitions/Acronyms... 3 4 IP Interconnect specification...
More informationCourse Description. Students Will Learn
Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user
More informationIntroduction to The Internet
Introduction to The Internet ISP Workshops Last updated 5 September 2014 1 Introduction to the Internet p Topologies and Definitions p IP Addressing p Internet Hierarchy p Gluing it all together 2 Topologies
More informationPacket Tracer 3 Lab VLSM 2 Solution
Packet Tracer 3 Lab VLSM 2 Solution Objective Create a simulated network topology using Packet Tracer Design an IP addressing scheme using a Class B subnetwork address and VLSM Apply IP addresses to the
More informationHP Networking BGP and MPLS technology training
Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,
More informationMPLS/BGP Network Simulation Techniques for Business Enterprise Networks
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT
More informationDemonstrating the high performance and feature richness of the compact MX Series
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
More informationInternet and Services
3 Internet and Services 3.1 INTRODUCTION The Internet began way back in 1969 when it was called ARPANet (Advanced Research Project Agency Network) and was used exclusively for military purposes. It soon
More informationNetwork Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology jili@cc.hut.fi Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
More informationOpen Transit Internet
international wholesale solutions Open Transit Internet data, a major player in the wholesale market Choose reliability and quality: Take advantage of our in-depth knowledge of the industry resulting from
More informationModule 12 Multihoming to the Same ISP
Module 12 Multihoming to the Same ISP Objective: To investigate various methods for multihoming onto the same upstream s backbone Prerequisites: Module 11 and Multihoming Presentation The following will
More informationIntroduction to The Internet. ISP/IXP Workshops
Introduction to The Internet ISP/IXP Workshops 1 Introduction to the Internet Topologies and Definitions IP Addressing Internet Hierarchy Gluing it all together 2 Topologies and Definitions What does all
More informationSwiftStack Global Cluster Deployment Guide
OpenStack Swift SwiftStack Global Cluster Deployment Guide Table of Contents Planning Creating Regions Regions Connectivity Requirements Private Connectivity Bandwidth Sizing VPN Connectivity Proxy Read
More informationIP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
More informationUniversal Network Access Policy
Universal Network Access Policy Purpose Poynton Workmens Club makes extensive use of network ed Information Technology resources to support its research and administration functions and provides a variety
More informationBGP. 1. Internet Routing
BGP 1. Internet Routing (C) Herbert Haas 2005/03/11 1 Internet Routing Interior Gateway Protocols (IGPs) not suitable for Inter-ISP routing Technical metrics only No policy features Inter-ISP routing is
More informationDESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER
DESTINATION BASED RTBH FILTERING AT ATTACK ORIGINATING INTERNET SERVICE PROVIDER Sarita Sharma 1, Davender Saini 2 1 Student M. Tech. ECE (2013-2015) Gurgaon Institute of Technology Management (M.D.U)
More informationSTPI Broadband Business Internet Services. Experience True Broadband
STPI Broadband Business Internet Services Experience True Broadband STPI Internet Services: Adding Value to your Business The first service provider in the country to start commercial Internet Services
More informationTransitioning to BGP. ISP Workshops. Last updated 24 April 2013
Transitioning to BGP ISP Workshops Last updated 24 April 2013 1 Scaling the network How to get out of carrying all prefixes in IGP 2 Why use BGP rather than IGP? p IGP has Limitations: n The more routing
More informationVirtual Subnet: A Scalable Cloud Data Center Interconnect Solution
Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution draft-xu-virtual-subnet-06 Xiaohu Xu (xuxh@huawei.com) IETF82, TAIWAN Why VM Mobility across Data Centers Data center maintenance Applications
More informationSimple Multihoming. ISP/IXP Workshops
Simple Multihoming ISP/IXP Workshops 1 Why Multihome? Redundancy One connection to internet means the network is dependent on: Local router (configuration, software, hardware) WAN media (physical failure,
More informationEuro6IX project and Italian IPv6 Task Force
Pisa, 11/05/05 Background information Telecom Italia Lab is the research department of Telecom Italia Group Working on IPv6 since 1995 and actively contributing to its development and standardization (FC
More informationEVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
More informationMPLS Architecture for evaluating end-to-end delivery
International Journal of Scientific and Research Publications, Volume 2, Issue 11, November 2012 1 MPLS Architecture for evaluating end-to-end delivery Nikita Wadhera Lovely Professional University Abstract-
More informationSERVICE DESCRIPTION INTERNET TRANSIT 04.05.15 / 2.6.4
SERVICE DESCRIPTION INTERNET TRANSIT 04.05.15 / 2.6.4 1 INTRODUCTION 4 2 DEFINITIONS AND ABBREVIATIONS 4 3 SERVICE OVERVIEW NATIONAL AND INTERNATIONAL 5 3.1 Geographic cover Internet Transit... 5 3.1.1
More informationAbout Cablenet. Ownership. Shareholders are:
An Overview About Cablenet Ownership Cablenet is a privately owned company that offers telecommunication and entertainment services to the corporate and retail markets. Shareholders are: CN Shiacolas Group
More informationF5 Silverline DDoS Protection Onboarding: Technical Note
F5 Silverline DDoS Protection Onboarding: Technical Note F5 Silverline DDoS Protection onboarding F5 Networks is the first leading application services company to offer a single-vendor hybrid solution
More informationComputer Cell (Information & Communication Technology) Research Center
Computer Cell (Information & Communication Technology) Research Center Post* (01) Deputy Manager IT 4 Year Bachelors or Masters of design, Commissioning and maintenance of Local and Wide Area Networks
More informationNational Education Network. KAREN School Cluster High-level Design
National Education Network KAREN School Cluster High-level Design Contents 1 Audience... 3 2 Reference Documents... 3 3 Version control... 3 4 Review and Approval... 3 5 Distribution... 3 6 Background...
More informationPREPARED FOR ABC CORPORATION
NETWORK DESIGN PROPOSAL PREPARED FOR ABC CORPORATION Prepared by Crystal Technologies PROPRIETARY AND CO NF IDE NTIAL Network Design Proposal PREPARED FOR ABC CORPORATION INC. ARTICLE I. OVERVIEW/HISTORY
More informationNovember 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
More informationUnderstanding Route Redistribution & Filtering
Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......
More informationVPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.
Virtual Private LAN Service (VPLS) A WAN that thinks it s a LAN. VPLS is a high security, low latency means to connect sites or services either point-to-point or as a mesh. We use Virtual Private LAN Service
More informationIntroduction to Routing
Introduction to Routing How traffic flows on the Internet Philip Smith pfs@cisco.com RIPE NCC Regional Meeting, Moscow, 16-18 18 June 2004 1 Abstract Presentation introduces some of the terminologies used,
More informationIPv6, Perspective from small to medium ISP
IPv6, Perspective from small to medium ISP April 13 th, 2010 INET Conference, Hong Kong Christian Dwinantyo Overview Some myths and facts about IPv6 Implementation Strategy Before you begin Case study:
More informationGÉANT MD-VPN Service Description High performance IP-VPN connectivity to support European Research and Education
GÉANT MD-VPN Service Description High performance IP-VPN connectivity to support European Research and Education Issue Date: 12 June 2015 1 1 GÉANT MD-VPN service description The
More informationCourse Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
More informationIP Telephony Management
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationThe Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public
The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com Introduction Well understood facts: o Fast is better than slow but it costs more to be fast o Network has to be fast and
More informationCampus LAN at NKN Member Institutions
Campus LAN at NKN Member Institutions RS MANI rsm@nkn.in 1/7/2015 3 rd Annual workshop 1 Efficient utilization Come from: Good Campus LAN Speed Segregation of LANs QoS Resilient Access Controls ( L2 and
More informationOptimizing Networks for NASPI
Optimizing Networks for NASPI Scott Pelton, CISSP National Director AT&T Enterprise Network Architecture Center 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks
More informationNetwork Technologies
Network Technologies Telephone Networks IP Networks ATM Networks Three Network Technologies Telephone Network The largest worldwide computer network, specialized for voice ing technique: Circuit-switching
More information5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network
5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:
More informationProfitably Get High Speed, Reliable CE 2.0 Services Out to Small and Medium Business Using EFM over Copper
Profitably Get High Speed, Reliable CE 2.0 Services Out to Small and Medium Business Using EFM over Copper The Small and Medium Business (SMB) Ethernet services market is creating huge access, value added
More informationExamination. IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491
Examination IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491 Date: December 15 2009 14:00 18:00 1. No help material is allowed - You
More informationA TYPICAL TELECOMMUNICATIONS NOC (an overview) Prepared by: Bode A. Oladipo
A TYPICAL TELECOMMUNICATIONS NOC (an overview) Prepared by: Bode A. Oladipo A BRIEF HISTORY Early versions of NOCs have been around since the 1960s. A Network Control Center was opened in New York by AT&T
More informationUnderstanding Virtual Router and Virtual Systems
Understanding Virtual Router and Virtual Systems PAN- OS 6.0 Humair Ali Professional Services Content Table of Contents VIRTUAL ROUTER... 5 CONNECTED... 8 STATIC ROUTING... 9 OSPF... 11 BGP... 17 IMPORT
More informationIndonesia Internet exchange IIX IIX and IIXv6 Development Update 2007
Indonesia Internet exchange IIX IIX and IIXv6 Development Update 2007 Andy Kurniawan admin@iix.net.id Overview Indonesian Internet History Birth of IIX The Role of IIX during the Monetary Crisis IIX Operation
More informationIntroduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
More informationIPv6 over IPv4/MPLS Networks: The 6PE approach
IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager (aliako@grnet.gr) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25
More informationSmall Business Server Part 2
Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP director@ciaops.com Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS
More informationPolicy Implementation and Experience Report. Leslie Nobile
Policy Implementation and Experience Report Leslie Nobile Recently Implemented Policies ARIN-2012-5: Removal of Renumbering Requirement for Small Multi-homers Ø No longer required to return and renumber
More informationCourse Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion
Key Data Product #: 3380 Course #: 6420A Number of Days: 5 Format: Certification Exams: Instructor-Led None This course syllabus should be used to determine whether the course is appropriate for the students,
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationRemote Voting Conference
Remote Voting Conference Logical Architecture Connectivity Central IT Infra NIST Best reachability in India for R-Voting Initiative 200+ Physical MPLS POPs across India 5 Regional Data Centre at Pune,
More informationSimple Multihoming. ISP Workshops. Last updated 30 th March 2015
Simple Multihoming ISP Workshops Last updated 30 th March 2015 1 Why Multihome? p Redundancy n One connection to internet means the network is dependent on: p Local router (configuration, software, hardware)
More informationNetwork-Wide Capacity Planning with Route Analytics
with Route Analytics Executive Summary Capacity planning is an important business process in large IP networks for ensuring reliable application and service delivery. In the days of fixed circuits and
More informationNTT - A global IPv6 deployment case study
About NTT NTT - A global IPv6 deployment case study Adoption considerations An Adoption how-to IPv6 beyond the transition Hikari-TV Earthquake warning service 6 All backbone equipment needs to be audited
More informationImplementing VPN over MPLS
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over
More informationHow To Build A Lightpath Network For Multiple Lightpath Projects
Building a LAN to Support Multiple Lightpath Projects Ronald van der Pol About SARA Computing and Networking services Houses and operates national supercomputer Huygens Houses and operates national
More informationKENET NETWORK INFRASTUCTURE. KENNEDY ASEDA kaseda@kenet.or.ke
KENET NETWORK INFRASTUCTURE KENNEDY ASEDA kaseda@kenet.or.ke Country of marathon winners? 2 Google Confidential and Proprietary Contents Network Infrastructure Network Operations Achievements & Challenges
More informationMPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud
MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service
More informationA Smart Telephone Answering Machine with Voice Message Forwarding Capability
A Smart Telephone Answering Machine with Voice Message Forwarding Capability Chih-Hung Huang 1 Cheng Wen 2 Kuang-Chiung Chang 3 1 Department of Information Management, Lunghwa University of Science and
More informationUnderstanding Large Internet Service Provider Backbone Networks
Understanding Large Internet Service Provider Backbone Networks Joel M. Gottlieb IP Network Management & Performance Department AT&T Labs Research Florham Park, New Jersey joel@research.att.com Purpose
More informationThe Key to Cost-Effective WAN Optimization - White Paper
The Key to Cost-Effective WAN Optimization - White Paper Table of Contents General...3 The Challenges of WAN Link Management in the Datacenter...3 Link Up-time and Business Continuity...3 The Active-backup
More informationOVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight
More informationChapter 1 Connecting the Router to the Internet
Chapter 1 Connecting the Router to the Internet This chapter describes how to set up the router on your Local Area Network (LAN) and connect to the Internet. It describes how to set up your wireless ADSL
More informationOptimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features
Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing
More informationPeering in Hong Kong. Che-Hoo CHENG CUHK/HKIX www.hkix.net
Peering in Hong Kong Che-Hoo CHENG CUHK/HKIX www.hkix.net How Internet Operates in simple terms Internet is composed of networks of ISPs and users User networks connect to ISPs Small ISPs connect to large
More informationCCNA Discovery: Designing and Supporting Computer Networks
CCNA Discovery: Designing and Supporting Computer Networks Overview of Case Studies Karen Alderson kalderso@cisco.com 1 CCNA Discovery Course Sequence CCNA Discovery Networking for Home and Small Businesses
More informationBell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines
Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers
More informationCOMPTEL PLUS Keys To Profitably Delivering VoIP to SMBs. Hosted IP-PBX and IP Trunking
COMPTEL PLUS Keys To Profitably Delivering VoIP to SMBs Hosted IP-PBX and IP Trunking 34 Topics for Discussion COSTS Hardware, Install, Network & Seat, Distribution, & Support Costs Pricing in SMB Market
More information20. Switched Local Area Networks
20. Switched Local Area Networks n Addressing in LANs (ARP) n Spanning tree algorithm n Forwarding in switched Ethernet LANs n Virtual LANs n Layer 3 switching n Datacenter networks John DeHart Based on
More information10233B: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
Course: 10233B: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Description: About this Course This five-day, instructor-led course provides you with the knowledge and skills
More informationLayer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
More informationDesigning a Microsoft Exchange Server 2003 Organization
Designing a Microsoft Exchange Server 2003 Organization Course 2008 - Two days - Instructor-led - Hands-On Introduction This two-day instructor-led course provides students with the knowledge and skills
More informationDatagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
More informationSimplify Your Route to the Internet:
Expert Reference Series of White Papers Simplify Your Route to the Internet: Three Advantages of Using LISP 1-800-COURSES www.globalknowledge.com Simplify Your Route to the Internet: Three Advantages of
More informationTeleworker User Guide
Teleworker User Guide Teleworker Service The Teleworker Service enables employees to work remotely with full access to voice mail, conferencing, and other features of the office phone system. The service
More informationS-38.3192 ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006
S-38.3192 ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006 Original version: Johanna Nieminen and Timo Viipuri (2005) Modified: Timo-Pekka Heikkinen, Juha Järvinen and Yavor Ivanov (2006) Task
More informationBorder Gateway Protocol (BGP-4)
Vanguard Applications Ware IP and LAN Feature Protocols Border Gateway Protocol (BGP-4) Notice 2008 Vanguard Networks 25 Forbes Blvd Foxboro, MA 02035 Phone: (508) 964 6200 Fax: (508) 543 0237 All rights
More information