////////////////// BURMA, NOVEMBER
|
|
|
- Dwayne Fletcher
- 10 years ago
- Views:
Transcription
1 report National Web portal development or repression? ////////////////// BURMA, NOVEMBER 2010 ////////////////////////////////////////////////////////////////////////////////////////////////
2 2 Yatanarpon Teleport, a company based in Yatanarpon IT City in Pyin Oo Lwin (Mandalay Division), launched the first National Web portal in October, portraying it as a significant step forward in the country s development of information technology and the Internet. At the opening ceremony, attended by Prime Minister Thein Sein, other senior officials and IT technicians, Yatanarpon Teleport said it was offering Burmese users a high-tech communication FTTH (fiber to the home) system comprising Internet, VOIP telephone and IPTV channels. The triple services VOIP telephone, Internet, IPTV will be available from a single fiber cable network with a higher speed than Wi Max, ADSL and dial-up systems that are currently in use. Several IT companies including China s ZTE and Huawei, which have been involved in building the cyber city, displayed products that they said suit Burma (Myanmar). This report will analyze the Myanmar National Web Portal and determine whether it represents a true IT development for the nation or an attempt to extend the military s repression of its citizens. Internet Links The Internet link currently used in Burma is the Sea-Me-We-3 Cyber Link through Singapore. It also links with trans-border cables of China and Thailand via the Greater Mekong Sub-Region Information Superhighway Link and of India (Figures 1 & 2). Burma can communicate with 34 countries through these links Figure 1: Myanmar Post and Telecommunication s International backbone Link
3 3 Figure 2: Burma s connection with Greater Mekong Sub-Region Information Superhighway Links and India So far, more than 10,000 km of fiber-optic cable have been installed across Burma covering almost all states and divisions (Figure 3). Figure 3: Current status of Burma s fiber-optic cable links (more than 10,000 km) According to Yatanarpon Teleport, two main ISP centers in Naypyidaw and Yatanarpon, and regional sub- ISP centers in Rangoon, Myitkyina, Taungyi, Lashio, Monywa, Magwe and Myeik will provide Internet service to various regions of the country (Figure 4).
4 4 Figure 4: Planned Regions for Main and Sub ISPs It is expected that the Hantharwaddy National Gateway will be able to provide a total bandwidth of Gbps, a significant rise from the total bandwidth of Gbps registered in March 2010 (Figure 5). Figure 5: Total bandwidth provided by Hantharwaddy National Gateway Yatanarpon Teleport has also planned to link with the Sea-Me-We-4 Cyber Link, an Asia-Europe submarine cable, via Bangladesh, which is the nearest country to the submarine cable. After completion of the project, the country will be able to communicate with other countries that link Sea-Me-We-4 via fiber-optic connection.
5 5 ISP Systems Previous System (Figures 6 and 7) From 2004 until October 2010, Burma used an ISP system that consisted of two ISP servers. A Ministry of Post and Telecommunications (MPT) ISP server provided Internet services to government ministries including the Ministry of Defence (MoD) and ADSL/dial-up private users. An ISP server from Yatanarpon Teleport also provided Internet services to private users (dial-up, ADSL, FTTH, wireless/broadband). After passing through Hantharwaddy National Gateway, Internet users could connect to the global Internet via SEA-ME-WE 3 and China-Burma cross-border fiber-optic cables. Hantharwaddy National Gateway is directly controlled by the military. Note: The ISP service of the Bagan Cyber Tech, created in 1990 by former Prime Minister Khin Nyunt, was taken over by Myanmar Teleport, which in 2004 was transformed into Yatanarpon Teleport. Figure 6: Configurations and systems of Myanmar ISP Services (2004-October 2010) Previous ISP system required all Internet requests to go through proxy servers in Yangon (Rangoon). The old system also created a bottleneck for military and government users, as they had to share the same ISP with private users. Web performance was also less than impressive. Figure 7: Previous ISP Processing System (2004-October 2010)
6 6 New System (Figures 8, 9 and 10) The new ISP system consists of two main servers the MPT ISP and the newly-created Ministry of Defence (MoD) ISP. The Yatanarpon Teleport ISP and the newly-established Naypyitaw ISP are placed under the MPT ISP. The MoD ISP will solely serve Internet users from the Ministry of Defence while the Naypyitaw ISP will provide Internet service to other government ministries. The Yatanarpon ISP on the other hand will only serve civilian Internet users. By using existing cables and newly linked SEA-ME-WE 4 cables, Burmese Internet users will be able to connect to the global Internet via Hantharwaddy National Gateway. Figure 8: Configurations and systems of Myanmar ISP Services (October 2010 onwards) The new ISP system will decrease loading on the National Gateway and main ISP. There will only be routerto-router request between core network and aggregate network. It will also make more bandwidth available between local ISPs, giving better Web performance for end users. However, the new system requires Internet requests to go through even more ISP servers and therefore users are subjected to more screening and controls. In addition to other Web services, Yatanarpon Teleport will also offer Ymail and Ytalk, which they expect Burmese users would use in the future instead of Gmail and Gtalk.
7 7 Figure 9: New ISP processing system (October 2010 onwards) In addition, the MoD will not only control its own IP router and optical transport equipment, but will also control those of the Hantharwaddy National Gateway, giving the military an exclusive ability to control the country s Internet system (Figure 10). Figure 10: ISP system map (October 2010 onwards)
8 8 Possible performance, reliability and stability problems In the earliest Burmese Internet system (before 2004), Internet requests were sent through modems to the PSTN (Public Switch Telephone Network), which in turn submitted them to the respective ISPs. An ISP proxy server would forward these requests to the proper domains (Figure 11). Figure 11: Internet request processing system (before 2004) From 2004 to October 2010, Internet requests had to go through Yatanarpon Teleport, the Security Gateway and the National Gateway before they could reach the intended domains (Figure 12). Image n apparaît pas sur le word Figure 12: Internet request processing system (2004-October 2010) In the new Internet system, users are separated into three different groups sharing the total bandwidth of Gbps. While fewer defence service users and government service users enjoy the entire bandwidth of the MoD ISP and Naypyitaw ISP, public users from the entire country have to share the Yatanarpon ISP (Figure 8). Assuming that all three ISPs equally share the entire bandwidth of slightly more than 1 Gbps, the military and the government will get better bandwidth than civilian users. If that is the case, public users are most likely to face performance problems such as bandwidth limitation controls, congested data traffic, reduced connection speed and connection time out, which in turn could destabilize the route. Possible security implications with new ISP System It is widely believed that the main reason for segregating users into different groups and allocating them to designated servers is to make it easier for the government to control Internet traffic. In time of civil unrest, for example, the government could shut down Yatanarpon ISP to block blogs and news reports by bloggers and journalists. Another security concern is the safety of Internet users login credentials. The following two attack mechanisms are likely to be placed in the new ISP systems.
9 9 1.Sniffing or MITM (Man in the Middle) attacks (Figure 13) Since user requests, server responses, login information and requested data are sent through the ISPs, the ISPs have opportunities to perform sniffing to capture packets and user information by installing a sniffer in their network. It is also possible for the ISP to perform MITM attacks to get user information and to change the actual data. Figure 13: Sniffing attack 2.DNS spoofing / DNS poisoning (Figure 14) ISPs may also perform DNS spoofing or DNS poisoning for the purpose of phishing (social engineering attacks). There has been speculation that military intelligence is already using such methods to watch popular webmail services such as Gmail and Facebook. In that system, login credentials that pass through the proxy of the ISP are intercepted by a fake Gmail/Facebook server. The fake server would then transfer the login request to the actual server, which would process the request and send feedback to the user. In most cases, users would not know that their login credentials have been logged by a fake server. Figure 14: DNS spoofing / DNS poisoning
10 10 Conclusion It is expected that the Yatanarpon Myanmar National Web Portal will provide faster bandwidth and improved Web services to Burmese Internet users. However, according to the current setup, only users from the government ministries, especially those from the Ministry of Defence, will enjoy faster Internet connection and consequently better Web services. The FTTH high-tech communication system is an impressive development compared with the previous system. It can also be assumed that the new system will cost more. However, given the low per capita income in Burma, only a tiny fraction of the public will be able to enjoy the FTTH system. The segregated nature of the new ISP system would also allow the authorities to shut down the civilian ISP without affecting the two other ISPs that serve the government and the military. The authorities are likely to use that opportunity to stifle freedom of press and expression. The new system also grants the military exclusive control over the Hantharwaddy National Gateway. The military is therefore now in a position to spy on all Burmese citizens civilians, soldiers and government service personnel. For more information: Burma Media Association / Maung Maung Myint: [email protected] - Tel: Fax: Reporters Without Borders / Lucie Morillon - New Media Desk: [email protected] Contact Presse : [email protected]
ICT Usage & Cyber Security Issues in Myanmar
ICT Usage & Cyber Security Issues in Myanmar AESEN-Japan International Symposium on Cyber Security Khin Swe Htay Deputy Chief Engineer Myanma Posts and Telecommunications Tokyo, Japan October 25, 2013
Country Report of Myanmar
Country Report of Myanmar Sub regional Workshop On Strengthening ICT Policies and Applications to Achieve MDGs and WSIS Goals in Southeast Asia and the Pacific Bangkok, Thailand October 19 20, 2009 Presented
Myanmar, a republic in South-East Asia, bounded on the north by Tibet
INFORMATIZATION STATUS IN MYANMAR Background Myanmar, a republic in South-East Asia, bounded on the north by Tibet Autonomous Region of China; on the east by China, Laos, and Thailand; on the south by
R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
User Manual. Page 2 of 38
DSL1215FUN(L) Page 2 of 38 Contents About the Device...4 Minimum System Requirements...5 Package Contents...5 Device Overview...6 Front Panel...6 Side Panel...6 Back Panel...7 Hardware Setup Diagram...8
Cooperation Opportunities in ICT Between Japan and Myanmar. Mr. Thein Oo President, Myanmar Computer Federation Chairman, Myanmar Info-Tech
Cooperation Opportunities in ICT Between Japan and Myanmar Mr. Thein Oo President, Myanmar Computer Federation Chairman, Myanmar Info-Tech Contents Introduction of Myanmar Cooperation with CICC ICT Status
A typical router setup between WebSAMS and ITEd network is shown below for reference. DSU. Router
1. Installation and configuration guidelines for the router replacement This guideline served as a reference for schools which plan to replace the existing WebSAMS router by the recommended router, and
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
Course Content: Session 1. Ethics & Hacking
Course Content: Session 1 Ethics & Hacking Hacking history : How it all begin Why is security needed? What is ethical hacking? Ethical Hacker Vs Malicious hacker Types of Hackers Building an approach for
Chapter 1 Configuring Basic Connectivity
Chapter 1 Configuring Basic Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration
Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th
Cybersecurity: Thailand s and ASEAN s priorities Soranun Jiwasurat www.etda.or.th Cyber Threat Landscape Overview 2 Cyber threat a hostile act using computers, electronic information and/or digital networks
INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS)
Web: Overview INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS) This document is designed to provide a quick installation and configuration guide for MDaemon along
Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011
Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011 Proprietary 2011 Media5 Corporation Table of Contents Introduction... 3 Solution Overview... 3 Network Topology... 4 Network Configuration...
Firewalls CSCI 454/554
Firewalls CSCI 454/554 Why Firewall? 1 Why Firewall (cont d) w now everyone want to be on the Internet w and to interconnect networks w has persistent security concerns n can t easily secure every system
Hosting more than one FortiOS instance on. VLANs. 1. Network topology
Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of
DOMINO Broadband Bonding Network
2 DOMINO AGGREGATION DE VOIES ETHERNET N 1 Bridging to the Future par [Hypercable] DOMINO DOMINO Broadband BondingTM Network Appliance With cellular data card failover/aggregation capability DANS CE NUMERO
Non-intrusive, complete network protocol decoding with plain mnemonics in English
The Triple Play Analysis Suite - DATA The Triple Play Analysis Suite - Data are meant for emulating the client s application such as FTP downloading or Web Browser testing at the termination point of DSL
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
Network Setup Guide. 1 Glossary. 2 Operation. 1.1 Static IP. 1.2 Point-to-Point Protocol over Ethernet (PPPoE)
Network Setup Guide 1 Glossary 1.1 Static IP Computers are communicated and recognized by their own unique IP addresses over the Internet. Static IP provided by your ISP (Internet Service Provider) means
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
Multi-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
Chapter 1 Configuring Internet Connectivity
Chapter 1 Configuring Internet Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration
NETWORK SETUP GLOSSARY
GLOSSARY NETWORK SETUP Static IP PPPoE DHCP DDNS Static IP Computers are communicated and recognized by their own unique IP addresses over the Internet. Static IP provided by your ISP (Internet Service
TCP/IP Protocol Suite. Marshal Miller Chris Chase
TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
Local-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
Load Balance Mechanism
Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router
JAMII TELECOMMUNICATIONS LTD COMPANYPROFILE
YOUR TRUSTED BUSINESS PARTN E R JAMII TELECOMMUNICATIONS LTD COMPANYPROFILE Table of Contents 1. Introduction 2. Our Vision 3. Our Mission 4. Our Core Values 5. Our Customer Service Vision 6. The Company
VoIP Solutions Guide Everything You Need to Know
VoIP Solutions Guide Everything You Need to Know Simplify, Save, Scale VoIP: The Next Generation Phone Service Ready to Adopt VoIP? 10 Things You Need to Know 1. What are my phone system options? Simplify,
Chapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1
Chapter 9 Internet Copyright 2011 John Wiley & Sons, Inc 10-1 Outline 9.2 - How the Internet Works - Basic Architecture - Connecting to an ISP - Internet Today 9.3 - Internet Access Technologies - DSL
Chapter 1 Connecting Your Router to the Internet
Chapter 1 Connecting Your Router to the Internet This chapter describes how to configure your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router Internet connection.when you perform the initial configuration
NF3ADV VoIP Setup Guide (for TPG)
NF3ADV VoIP Setup Guide (for TPG) Configuring your NF3ADV for TPG VoIP The following steps will take you through the process of setting up your VoIP connection. This guide assumes that the NF3ADV already
Multi-Homing Gateway. User s Manual
Multi-Homing Gateway User s Manual Contents System 5 Admin Setting Date/Time Multiple Subnet Hack Alert Route Table DHCP DNS Proxy Dynamic DNS Language Permitted IPs Logout Software Update 8 12 21 22 33
RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009
Systems Development Proposal Scott Klarman March 15, 2009 Systems Development Proposal Page 2 Planning Objective: RAS Associates will be working to acquire a second location in Detroit to add to their
ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network
ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network Release: 1 ICTTEN5168A Design and implement an enterprise voice over internet protocol and
ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
WAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
Network Services Internet VPN
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order
Internet Basics. Basic Terms and Concepts. Connecting to the Internet
Internet Basics In this Learning Unit, we are going to explore the fascinating and ever-changing world of the Internet. The Internet is the largest computer network in the world, connecting more than a
CCProxy. Server Installation
CCProxy Proxy Server for Win98/NT/2000/XP/2003/Vista/2008 www.youngzsoft.net Server Installation 2009.02 1 Content 1 Content...1 2 LAN networks configuration...2 3 Internet connection configuration...4
Computer Networks and the Internet
? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431
Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE
Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications
Lesson 13: DNS Security. Javier Osuna [email protected] GMV Head of Security and Process Consulting Division
Lesson 13: DNS Security Javier Osuna [email protected] GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation
For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1
For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1 Talk America Services Customer Service 1-855-546-5000, press 3 TALK
List of Figures Analysis Executive Summary 1. International Call Volumes and Growth Rates, 1994-2014 2. Compounded Annual Traffic Growth Rate by
TeleGeography Report Analysis Executive Summary Traffic Analysis Supplementary Figures Traffic by Region Traffic by Country Prices and Revenues Supplementary Figures Retail Rates Wholesale Rates Interconnection
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
Wireless G Broadband quick install
Wireless G Broadband Router quick install guide Model 503693 INT-503693-QIG-0608-02 Thank you for purchasing the INTELLINET NETWORK SOLUTIONS Wireless G Broadband Router, Model 503693. This quick install
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Introduction to Meg@POP
Introduction to Meg@POP SingTel Meg@POP is a comprehensive suite of IP services for businesses which need a secured connection to multiple locations, parties or services in Singapore. It provides a simple
Internet Services. Amcom. Support & Troubleshooting Guide
Amcom Internet Services This Support and Troubleshooting Guide provides information about your internet service; including setting specifications, testing instructions and common service issues. For further
The Internet and Its Uses
CHAPTER 1 The Internet and Its Uses Objectives After completing this chapter, you should be able to answer the following questions: How is the Internet evolving? How do businesses and individuals use the
CHAPTER 10 THE INTERNET
CHAPTER 10 THE INTERNET Chapter Summary This chapter examines the Internet in more detail to explain how it works and why it is a network of networks. The chapter also examines Internet access technologies,
IPv6 Migration Challenges for Large Service Providers
IPv6 Migration Challenges for Large Service Providers Aruna P General manager Network Operation Agenda Airtel Overview Drivers of IPV6 Migration challenges Design Considerations Deployment plan Airtel
Voice over Internet Protocol (VoIP) - An Introduction
PITCOM Voice over Internet Protocol (VoIP) - An Introduction Peter Ingram Chief Technology Officer Ofcom 18th January 2005 Ofcom What is Voice over IP? Carrying Voice Traffic on Networks Designed for Data
Voice Peering: Interworking SIP and BGP
Voice Peering: Interworking SIP and BGP 2010 Feb 23 Comcast Cable National Engineering & Technical Operations (NE&TO) Network Engineering Matt Christopher Principal Engineer, VoIP Architecture Integration
How to Remotely View Security Cameras Using the Internet
How to Remotely View Security Cameras Using the Internet Introduction: The ability to remotely view security cameras is one of the most useful features of your EZWatch Pro system. It provides the ability
Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements
Connecting to the Internet LAN Hardware Requirements Computer Requirements LAN Configuration Requirements Installation Performed by Time Warner Cable Technician Connecting via Ethernet Connecting via USB
Alexander Nikov. 6. Telecommunications and networks, the Internet. Hyundai Heavy Industries Creates A Wireless Shipyard. a Wireless Shipyard
INFO 1500 Introduction to IT Fundamentals Learning Objectives 6. Telecommunications and networks, the Internet 1. Identify the principal components of telecommunications networks and key networking technologies.
CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE
CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE Due to the encouraging feedback this series of articles has received, we decided to explore yet another type of cyber intrusionthe Man In The Middle (MITM)
ARP and DNS. ARP entries are cached by network devices to save time, these cached entries make up a table
ARP and DNS Both protocols do conversions of a sort, but the distinct difference is ARP is needed for packet transfers and DNS is not needed but makes things much easier. ARP Address Resolution Protocol
Chapter 3 Connecting the Router to the Internet
Chapter 3 Connecting the Router to the Internet This chapter describes how to set up the router on your Local Area Network (LAN) and connect to the Internet. It describes how to configure your DG834GT
Understand Wide Area Networks (WANs)
Understand Wide Area Networks (WANs) Lesson Overview In this lesson, you will review: Dial-up Integrated services digital networks (ISDN) Leased lines Virtual private networks (VPN) Wide area networks
Redundancy for Corporate Broadband
Redundancy for Corporate Broadband WHITE PAPER December, 2012 Introduction Over the past twenty years, broadband service providers have been using different mediums to deliver their services. From wireless
Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015
Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,
TELEPHONE MAN OF AMERICA. Earning Your Business Every Step of the Way!
TELEPHONE MAN OF AMERICA Earning Your Business Every Step of the Way! Specializing in Telecom Equipment of all Brands, Carrier Services, Technician Services, Maintenance Agreements & Purchasing Excess
P-2302HW/HWL-P1. Quick Start Guide. 802.11b/g Wireless VoIP Station Gateway. Version 3.60 Edition 1 8/2006
P-2302HW/HWL-P1 802.11b/g Wireless VoIP Station Gateway Quick Start Guide Version 3.60 Edition 1 8/2006 1 Connect the Hardware P-2302HW/HWL-P1 Series Quick Start Guide 1WAN: Use an Ethernet cable to connect
Licence Issued List. Company Name Address Licence Type Services Date. MICT Park Building No.10 Block 2 Myanmar Info Tech, Hlaing Township, Yangon
/ List Company Name Address Type Services 1 5-2-2014 4-2-2029 Ooredoo Myanmar Limited MICT Park Building 10 Block 2 Myanmar Info Tech, Hlaing Township, Nationwide Telecommunications All Telecommunication
Component 4: Introduction to Information and Computer Science
Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking Lecture 1 This material was developed by Oregon Health & Science University, funded by the Department of Health
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Prestige 2602HW-C Series. Prestige 2602HWL-C Series
Prestige 2602HW-C Series 802.11g Wireless ADSL VoIP IAD Prestige 2602HWL-C Series 802.11g Wireless ADSL VoIP IAD with Lifeline Quick Start Guide Version 3.40 3/2005 Prestige 2602HW Series Quick Start Guide
Installation of the On Site Server (OSS)
Installation of the On Site Server (OSS) rev 1.1 Step #1 - Initial Connection to the OSS Having plugged in power and an ethernet cable in the eth0 interface (see diagram below) you can connect to the unit
maxis fibre internet quick start guide
maxis fibre internet quick start guide Welcome a warm welcome from all of us at maxis Congratulations for taking the first step in turning your house into a Maxis Home! With Maxis Home Fibre Internet,
Chapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
Glossary of Telco Terms
Glossary of Telco Terms Access Generally refers to the connection between your business and the public phone network, or between your business and another dedicated location. A large portion of your business
Smart Telephone System
IG7600 Smart Telephone System Quick Installation Guide Copyright 2013, All Rights Reserved. Ver11140311 IG7600 Smart Telephone System Quick Installation Guide Powering up 1. Plug the IG7600 in and allow
Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch
Vocia MS-1 Network Considerations for VoIP Vocia software rev. 1.4 or higher required Vocia MS-1 and Network Port Configuration The Vocia Message Server 1 (MS-1) has a number of roles in a Vocia Paging
Build yourself an ISP
Ouch what just bit me? So you ve been bitten by the Internet bug and want to dive into the world wide web by becoming what is called an Internet Service Provider (ISP). The good news is that it is actually
Ten top problems network techs encounter
Ten top problems network techs encounter Networks today have evolved quickly to include business critical applications and services, relied on heavily by users in the organization. In this environment,
For extra services running behind your router. What to do after IP change
For extra services running behind your router. What to do after IP change This guide is for customers who meet the following conditions: - Customers who have moved from a TPG Layer 3 plan to a TPG Layer
Virtual Leased Line (VLL) for Enterprise to Branch Office Communications
Virtual Leased Line (VLL) for Enterprise to Branch Office Communications Reliable high throughput data connections with low-cost & diverse transport technologies Executive Summary: The Truffle Broadband
Prestige 2302R Series
VoIP Station Gateway Quick Start Guide Version 3.60 6/2005 Overview This Quick Start Guide covers the Prestige (P2302R) and (P2302RL) models. It explains how to use your Prestige to make phone calls through
Proxy Server, Network Address Translator, Firewall. Proxy Server
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
Project Community Network Planning
Project Community Network Planning Project Requirement: Building a community network connecting 16 apartment buildings with total of 741 units. Each unit will have access to 2 ports, totaling 1482 ports.
Small Business Server Part 2
Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP [email protected] Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS
LAN TCP/IP and DHCP Setup
CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
ewon-configuration for Internet Access using the Wizard How to
ewon Application User Guide Content You Select, We Connect AUG 019 / Rev 1.1 ewon-configuration for Internet Access using the Wizard How to This guide will explain you how to configure your ewon to access
