Quantum Secure Communication Networks:
|
|
|
- Berenice Parsons
- 10 years ago
- Views:
Transcription
1 QCrypt 2014 Quantum Secure Communication Networks: Products and Solutions Yong Zhao
2 1 Founda2on Ini2ally founded by the university (USTC) and private investors in 2009 Research Lab (USTC) Company (QuantumCTeK)
3 1 Founda2on Ini2ally founded by the university (USTC) and private investors in 2009 Hefei head quarter, three other branches Equip commercial fiber with QKD products Company (QuantumCTeK) Beijing Jinan Hefei Shanghai
4 Why QKD and Q- network Encryptor network Encryptor Encryptor Secure communica2on Tunnel Encryptor Key distribu2on Secure communica2on = Secure encryp2on + Secure key distribu2on
5 Why QKD and Q- network Cryptography at present For de/encrypt For key exchange Symmetric Cryptography AES IDEA Strong RC6 RSA RSA Asymmetric Cryptography ECC ECC Not Strong D- H n RSA512 is broken in 1999 n RSA768 is broken in 2009 n RSA1024 is broken in. n All Asymmetric Cryptography at present can be broken by Shor s quantum algorithm n No asymmetric Cryptography can be uncondi2onal secure
6 Why QKD and Q- network Cryptography at present For de/encrypt For key exchange Symmetric Cryptography AES One IDEA 2me pad? Strong RC6 RSA RSA Asymmetric Cryptography ECC ECC Not Strong D- H n RSA512 is broken in 1999 n RSA768 is broken in 2009 n RSA1024 is broken in. n All Asymmetric Cryptography at present can be broken by Shor s quantum algorithm n No asymmetric Cryptography can be uncondi2onal secure
7 Why QKD and Q- network Quantum key Distribu2on QKD seems to be the most outstanding Candidate for the future key infrastructure Post quantum cryptography achievable Low total cost Quantum Noise Encryp2on achievable Low cost Maybe an2- quantum afack Proved uncondi2onal security An2- quantum afack achievable Low cost
8 The goals: Secure communica2on networks over Quantum key infrastructure Service Applica2on Phone\Video\Data transmit\e- Bank\Smart Grid\... Encryp2on\Authen2ca2on\Signature\... Secure Communica2on networks Key Management QKD network Bofom tech Genera2on\distribu2on\Storage\usage\discard QLAN\QMAN\QWAN QKD Module\Convergence node\trusted Relay Op2cal Switch\Quantum Repeater Key infrastructure
9 The Roadmap of QKD network in China 2006 n World s first Decoy QKD experiment over 100km n Quantum phone network( 3- nodes) p Na2onal Quantum Backbone network (Over 2000km) n World s first Decoy QKD experiment over 200km n All pass Metro- area QKD network (5 nodes) n Hefei Metro- Quantum network(46 nodes) n Jinan Metro- Quantum network (56 nodes,>90users) 7 24 running for 9 month already S N
10 2 Product landscape and design QLAN QMAN QWAN Applica2on All- pass Op2cal Switch n 16 FC- PC op2cal interface n Op2cal loss less than 1.5dB n Ethernet Control interface QKG server Ethernet fiber fiber fiber QKD QKD. Maximally connect 16 QKD terminal QKD
11 2 Product landscape and design QLAN QMAN QWAN Applica2on Terminal QKD transceiver n BB84 Decoy state protocol n Special design for all- pass type QLAN n Higher rate and less cost n Resistant to all known quantum hacker n Fully hardware designed n Op2cal path loss tolerance up to 18dB LD OA VOA VOA OA LD Circulator Circulator EPC Bi- direc2on Quantum Channel EPC Mul2- channel SPD Mul2- channel SPD
12 2 Product landscape and design QLAN QMAN QWAN Applica2on Centralized Control Sta2on n Convergence node and trusted relay in MAN n Time Division Mul2plexing to reduce total- cost
13 2 Product landscape and design QLAN QMAN QWAN Applica2on Why trusted relay? There was a gap between the period of prac:cal Quantum computer and Quantum repeater, meanwhile the trusted relay is the best choice A huge quantum computer like this may be fatal to asymmetric cryptography But a quantum repeater of similar size can not be set up in the most today telecom carrier room
14 2 Product landscape and design QLAN QMAN QWAN Applica2on GHz QKD Module n Design for Backbone QKD network n Op2cal path Loss tolerance up to more than 25dB n Final key rate up to 1Mbps n Fully hardware designed n ATCA adapt n Easy installa2on and maintenance Data process module Single Photon Detector Module
15 2 Product landscape and design QLAN QMAN QWAN Applica2on Quantum Ethernet Encryptor n Integrated design(qkd and Encryptor in one Chassis) n Hardware(FPGA) Encryp2on up to 10Gbps n Key(128bits) refresh rate up to 1000key/s n Ethernet network interface n Comply with Chinese na2onal standards with the cer2ficate QNE- 1000D LAN QNE- 1000D QNE- 1000D LAN
16 2 Product landscape and design QLAN QMAN QWAN Applica2on Quantum VPN n Dual key(ike key and Quantum key) n encryp2on up to 10Gbps(CBC mode) n Key refresh rate up to 100key/s n Ethernet\SFP\XFP network interface n Stackable
17 3 Commercial service case Government applica2on case Government agency 1# GRE Tunnel B J B ranch SDH Link Office Quantum VPN Ethernet swi tch HA Internet (ChinaUnicom) Quantum VPN Ethernet swi tch HA Ethernet swi tch Keep al i ve HA Quantum VPN QKD and KM Client QKD and KM client QKD and KM client QMAN
18 3 Commercial service case Local bank applica2on case
19 3 Commercial service case Backbone Bank applica2on case
20 4 Collabora2on and Market CSRC
21 Thanks for your Website: info.com
1.Context... 3. What is the problem with current cryptographic techniques?... 3. 2.Current Quantum Key Distribution (QKD)... 4
Page 2 Table of contents 1.Context... 3 What is the problem with current cryptographic techniques?... 3 2.Current Quantum Key Distribution (QKD)... 4 What is Quantum Cryptography?... 4 How does QKD improve
SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS
SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS AUDIENCE Data networks consultants, Network architects, designers and administrators/ managers, Systems Integrators (SI) and networks
High speed link encryption State of the art. ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com
High speed link encryption State of the art ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com Agenda Company Solutions Risks Encryption Today (State of the Art) Quantum Cryptography, QKD
Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014
Quantum Safe Security Workgroup Presentation Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 ID Quantique Photon Counters Services Quantum Random Number Generators Technology
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
Securing Your Data In Transit For The Long Term
Securing Your Data In Transit For The Long Term Or what happens when RSA encryption is finally broken by mathematicians or quantum computers? October 2014 ID Quantique Photon Counters Services Quantum
1.264 Lecture 37. Telecom: Enterprise networks, VPN
1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients
Spectrum Scarcity and Free Space Op1cal Communica1ons. Mohamed- Slim Alouini KAUST January 2014
Spectrum Scarcity and Free Space Op1cal Communica1ons Mohamed- Slim Alouini KAUST January 2014 Agenda Spectrum Scarcity RF spectrum Mobile traffic growth and spectrum scarcity Cogni1ve Radio Networks (CRNs)
1.264 Lecture 34. Telecom: Connecting wired LAN, WAN. Next class: Green chapter 17. Exercise due before class
1.264 Lecture 34 Telecom: Connecting wired LAN, WAN Next class: Green chapter 17. Exercise due before class 1 Exercise Your transportation brokerage company also handles billing for freight shipments,
By: Mohsen Aminifar Fall 2014
By: Mohsen Aminifar Fall 2014 Contact Information: E-Mail: [email protected] [email protected] Phone : 021-22919726 09128442885 Website : http://parsenet.ir http://aminifar.ir SMS Center : 5000262175
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
COMPSCI 111 / 111G An introduc)on to prac)cal compu)ng
COMPSCI 111 / 111G An introduc)on to prac)cal compu)ng Introduc)on to Networking and the Internet 3/8/15 1 From the Telephone to the Internet 1876: First successful bi- direc;onal transmission of clear
Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell
Quantum Key Distribution as a Next-Generation Cryptographic Protocol Andrew Campbell Abstract Promising advances in the field of quantum computing indicate a growing threat to cryptographic protocols based
1.264 Lecture 35. Telecom: Fiber optics. Next class: Green chapter 18-21. Exercise due before class
1.264 Lecture 35 Telecom: Fiber optics Next class: Green chapter 18-21. Exercise due before class 1 T1 T1 is shorthand for 1.5 Mbps connection T1 is the standard over copper T1 is used as a shorthand for
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer
Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer Layer 2 Network Encryption where safety is not an optical illusion Todays Agenda Fibre is safe
communication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
Security & Surveillance Cabling Systems
Security & Surveillance Cabling Systems Security and Surveillance Cabling Systems The video security industry is growing and ever-changing, offering a wealth of opportunity for today s security professionals.
How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)
WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security
Lucent VPN Firewall Security in 802.11x Wireless Networks
Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper
Network Design. Yiannos Mylonas
Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which
Quantum Enabled Security Solutions. Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com
Quantum Enabled Security Solutions Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com 10 Years of Quantum Innovation IDQ presents its first quantum cryptography (QC) prototype First QC system sold
ROGERS DELIVERS THE SPEED, POWER AND RELIABILITY OF FIBRE RIGHT TO YOU.
ROGERS DELIVERS THE SPEED, POWER AND RELIABILITY OF FIBRE RIGHT TO YOU. ROGERS BUSINESS SOLUTIONS When you partner with Rogers Business Solutions, you benefit from on-going collaboration with our team
ETHERNET ENCRYPTION MODES TECHNICAL-PAPER
1 ETHERNET ENCRYPTION MODES TECHNICAL-PAPER The CN series encryption platform is designed to secure information transmitted over a number of network protocols. The CN series encryptors secure Ethernet
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
24 th IEEE Annual Computer Communications Workshop (CCW)
24 th IEEE Annual Computer Communications Workshop (CCW) Exploration of Quantum Cryptography in Network Security Presented by Mehrdad S. Sharbaf Sharbaf & Associates Loyola Marymount University California
Network edge and network core. millions of connected compu?ng devices: hosts = end systems running network apps
Computer Networks 1-1 What s the Internet: nuts and bolts view PC server wireless laptop cellular handheld access points wired links millions of connected compu?ng devices: hosts = end systems running
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
1.264 Lecture 36 (Solutions)
1.264 Lecture 36 (Solutions) Telecom: Wireless networks Next class: Green chapter 31,33, 36, 39. No exercise. 1 Exercise Design a system for an intercity rail passenger train to provide Internet access
High Speed Encryption Made in Germany
High Speed Encryption Made in Germany Today s Trends in Network Encryption 2 Today s Trends in Network Encryption Contents Background ATMedia GmbH Why Encryption? Which Encryption? How to deploy Encryption
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream
Virtual Privacy vs. Real Security
Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF
High Speed Ethernet Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF Hubs and Switches Hubs and Switches Shared Medium Hub The total capacity in the shared medium hub configuration (figure
Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik
Privacy- Preserving P2P Data Sharing with OneSwarm Presented by Adnan Malik Privacy The protec?on of informa?on from unauthorized disclosure Centraliza?on and privacy threat Websites Facebook TwiFer Peer
Enterprise Business Products 2014
Enterprise Business Products 2014 Enterprise Ethernet Services EPL (Ethernet Private Line) - provides point-to-point connectivity between two business locations with scalable bandwidth speeds via an Ethernet
How To Build A Network For Storage Area Network (San)
White Paper Data Storage across the MAN by deploying a SAN over Dark Fiber by Pieter Panis, EuroFiber 1/7 1 Introduction The purpose of this document is to illustrate how a storage area network (SAN) can
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
NEC Produktpor-olio. Compact ODU. ipasolink 400/400A. ipasolink EX. ipasolink 200. ipasolink 100E ipasolink 1000. ipasolink ix.
NEC Produktpor-olio Compact ODU ipasolink 400/400A ipasolink EX ipasolink 200 ipasolink 100E ipasolink 1000 ipasolink ix ipasolink SX ipasolink GX Inves55onssicherheit NEC ipasolink Ø Carrier Class Equipment
Marker Drivers and Requirements. Encryption and QKD. Enterprise Connectivity Applications
Marker Drivers and Requirements for Encryption and QKD in Enterprise Connectivity Applications Christian Illmer September 2009 ADVA Optical Networking ADVA is a leading global provider of xwdm optical
NEW WORLD TELECOMMUNICATIONS LIMITED. 2 nd Trial Test Report on 3.5GHz Broadband Wireless Access Technology
NEW WORLD TELECOMMUNICATIONS LIMITED 2 nd Trial Test Report on 3.5GHz Broadband Wireless Access Technology Issue Number: 01 Issue Date: 20 April 2006 New World Telecommunications Ltd Page 1 of 9 Issue
Value Proposition for Data Centers
Value Proposition for Data Centers C ollocation or a trend of hosting customers servers at a provider s physical location has been steadily growing in the recent years due to its many benefits. The collocation
Layer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
IT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
EECC694 - Shaaban. Transmission Channel
The Physical Layer: Data Transmission Basics Encode data as energy at the data (information) source and transmit the encoded energy using transmitter hardware: Possible Energy Forms: Electrical, light,
ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
Your Wide Area Network Just Got a Whole Lot Wider.
Your Wide Area Network Just Got a Whole Lot Wider. Rely on XO for networking solutions that will enhance your business today and tomorrow. Contact your local XO sales representative or visit us at www.xo.com
INTRODUCTION TO MEDIA CONVERSION
WHITE PAPER INTRODUCTION TO MEDIA CONVERSION Table of Contents Introduction 1 What is a Media Converter? 1 Advantages of Media Conversion Technology 1 Benefits of Fiber Optic Cabling 2 Types of Media Converters
Network Topologies. Network Topologies
Network Topologies LANs and WANs - Geographical coverage LANs A single geographical location, such as office building, school, etc Typically High speed and cheaper. WANs Spans more than one geographical
Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
NETWORKING TECHNOLOGIES
NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.
Chapter 1 Instructor Version
Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic
Study on Remote Access for Library Based on SSL VPN
, pp.111-122 http://dx.doi.org/10.14257/ijca.2016.9.1.11 Study on Remote Access for Library Based on SSL VPN Mei Zhang Library, Linyi University, Shandong, 276000, China [email protected] Abstract With
25 Years of Manufacturing Excellence. Premier Quatro Addressable Fire Alarm System. Assessed to ISO 9001: 2008
Premier Quatro Addressable Fire Alarm System Premier Quatro 4 Loop Analogue Addressable Fire Alarm Panel The Premier Quatro is the new 4 loop analogue Alarm Systems. It is available in 1, 2, 3 or 4 loop
Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
Minor in ii INFORMATION SECURITY i at ESIEA Laval, France
Minor in ii INFORMATION SECURITY i at ESIEA Laval, France Program Strengths Provides a thorough overview of information and network security, from secure programming to risk management within a company.
EXINDA NETWORKS. Deployment Topologies
EXINDA NETWORKS Deployment Topologies September 2005 :: Award Winning Application Traffic Management Solutions :: :: www.exinda.com :: Exinda Networks :: [email protected] :: 2005 Exinda Networks Pty Ltd.
The WI-PIE Program. Backbone Technical description
The WI-PIE Program Backbone Technical description Turin 19 mar 2010 Davide La Valle Architecture and Network design group Infrastructural Services Division [email protected] Agenda Regional Backbone
Failsafe WAN, VoIP, IVRS & LAN connectivity
Failsafe WAN, VoIP, IVRS & LAN connectivity Client : Asia 's biggest integrated Jewellery manufacturer Customer's requirement: The customer wanted to establish WAN and VoIP connectivity between their offices
The Seven Habits of State-of-the-Art Mobile App Security
#mstrworld The Seven Habits of State-of-the-Art Mobile App Security Mobile Security 8 July 2014 Anand Dwivedi, Product Manager, MicroStrategy strworld Agenda - Seven Habits of State of the Art Mobile App
Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)
Chapter 11: WAN Abdullah Konak School of Information Sciences and Technology Penn State Berks Wide Area Networks (WAN) The scope of a WAN covers large geographic areas including national and international
CSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE
Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications
Broadband Cable Service Deployment at WorldCall Telecom - Pakistan. Hassan Zaheer Manager Operations Broadband Division
Broadband Cable Service Deployment at WorldCall Telecom - Pakistan Hassan Zaheer Manager Operations Broadband Division Broadband Cable Cable services provides Intelligent network Mix of IP and MPEG Multiple
WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services
WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain
Resilient Metropolitan Area Networks
Resilient Metropolitan Area Networks t. 902.442.1540 f. 902.442.1559 w. www.internetworking-atlantic.com 1 Resilient Metropolitan Area Networks Technologies for wide area network (WAN) and metropolitan
10G CWDM Conversion Technology
10G CWDM Conversion Technology Simplifying Today s Challenges By Transition Networks Curt Carlson Product Manager [email protected] com Agenda WDM Technology Overview What are the features/benefits
Migration to 40/100G in the Data Center with OM3 and OM4 Optical Connectivity
Migration to 40/100G in the Data Center with OM3 and OM4 Optical Connectivity Needs in the Data Center With the continued requirement for expansion and growth in the data center, infrastructures must provide
White Paper. OPCOM3500 Multi-Service Access Platform INTRODUCTION CHARACTERISTICS
OPCOM3500 Multi-Service Access Platform INTRODUCTION Until recently, the service model for carriers and service providers focuses on delivering bandwidth to a stable, predictable customer base through
Market Central www.secureswitch.com
Market Central www.secureswitch.com 500 Business Center Drive Pittsburgh, PA 15205 USA 412.494.2800 CAGE 1BGJ7 APPLICATION NOTES SwitchMaster R5000 Series & Switching Systems SwitchMaster R5000 Series
Using Omnisec 422 and 423 IP Encryptors Over BGAN
Using Omnisec 422 and 423 IP Encryptors Over BGAN Version 02 29 th December 2009 Contents 1 Overview 1 2 Benefits to BGAN Users 1 3 Possible Application Scenarios 1 4 Typical Users 1 5 Product Range 1
Building Voice VPN with Simton IPX
Building Voice VPN with Simton IPX (Simton Technologies, Inc.) Version 6 With Simton IPX, the small and medium businesses can easily consolidate data and voice network together to increase productivity,
Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
Appendix 3. Specifications for e-portal
Appendix 3. Specifications for e-portal 1. e-portal H/W and S/W No Equipment Specification Unit Q'ty 1 Web Server for users and administrator 2 WAS Server 3 LMS Server 4 DB Server 4U Rack Type 8 Core Intel
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
C20.0001 Information Systems for Managers Fall 1999
New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in
10 Gigabit Ethernet: Scaling across LAN, MAN, WAN
Arasan Chip Systems Inc. White Paper 10 Gigabit Ethernet: Scaling across LAN, MAN, WAN By Dennis McCarty March 2011 Overview Ethernet is one of the few protocols that has increased its bandwidth, while
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
Chapter 4 Connecting to the Internet through an ISP
Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No
Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.
Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point
Virtual Private Networks
Virtual Private Networks Rene Bahena Felipe Flores COEN 150 Project Report Chapter 1: What is a VPN? VPN stands for Virtual Private Network and is a way of making a secure remote connection to a private
Introduction. Background
Introduction By far, the most widely used networking technology in Wide Area Networks (WANs) is SONET/SDH. With the growth of Ethernet now into Metropolitan Area Networks (MANs) there is a growing need
Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.
Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote
Chapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
Converged TDM and IP- Based Broadband Solutions White Paper. OnSite OS-10 Multi-Service over SDH Provisioning
Converged TDM and IP- Based Broadband Solutions White Paper OnSite -10 Multi-Service over SDH Provisioning Copyright Copyright 2009, Patton Electronics Company. All rights reserved. Printed in the USA.
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
Flexible SDN Transport Networks With Optical Circuit Switching
Flexible SDN Transport Networks With Optical Circuit Switching Multi-Layer, Multi-Vendor, Multi-Domain SDN Transport Optimization SDN AT LIGHT SPEED TM 2015 CALIENT Technologies 1 INTRODUCTION The economic
University-Industry Interaction: The Case of Optical Communications in Brazil
Prof. Hugo Fragnito; 29/05/15 [1] Na#onal Ins#tute of Photonics Science and Technology for Op#cal Communica#ons Ins#tuto Nacional de Ciência e Tecnologia Fotônica para Comunicações Óp#cas University-Industry
Expert Reference Series of White Papers. Planning for the Redeployment of Technical Personnel in the Modern Data Center
Expert Reference Series of White Papers Planning for the Redeployment of Technical Personnel in the Modern Data Center [email protected] www.globalknowledge.net Planning for the Redeployment of
LONI Provides UNO High Speed Business Con9nuity A=er Katrina. Speakers: Lonnie Leger, LONI Chris Marshall, UNO
LONI Provides UNO High Speed Business Con9nuity A=er Katrina Speakers: Lonnie Leger, LONI Chris Marshall, UNO Presentation Order Business Con:nuity UNO LONI LONI + UNO Q & A Hurricane Katrina Impact LONI
Polish National Data Storage. Norbert Meyer, Maciej Brzeźniak, Maciej Stroiński PSNC
Polish National Data Storage Norbert Meyer, Maciej Brzeźniak, Maciej Stroiński PSNC Workshop on Big Data and Open Data, Brussels. May 7-8, 2014 Data = value => needs protection! Data is value:! Expensive
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
