Quantum Secure Communication Networks:

Size: px
Start display at page:

Download "Quantum Secure Communication Networks:"

Transcription

1 QCrypt 2014 Quantum Secure Communication Networks: Products and Solutions Yong Zhao

2 1 Founda2on Ini2ally founded by the university (USTC) and private investors in 2009 Research Lab (USTC) Company (QuantumCTeK)

3 1 Founda2on Ini2ally founded by the university (USTC) and private investors in 2009 Hefei head quarter, three other branches Equip commercial fiber with QKD products Company (QuantumCTeK) Beijing Jinan Hefei Shanghai

4 Why QKD and Q- network Encryptor network Encryptor Encryptor Secure communica2on Tunnel Encryptor Key distribu2on Secure communica2on = Secure encryp2on + Secure key distribu2on

5 Why QKD and Q- network Cryptography at present For de/encrypt For key exchange Symmetric Cryptography AES IDEA Strong RC6 RSA RSA Asymmetric Cryptography ECC ECC Not Strong D- H n RSA512 is broken in 1999 n RSA768 is broken in 2009 n RSA1024 is broken in. n All Asymmetric Cryptography at present can be broken by Shor s quantum algorithm n No asymmetric Cryptography can be uncondi2onal secure

6 Why QKD and Q- network Cryptography at present For de/encrypt For key exchange Symmetric Cryptography AES One IDEA 2me pad? Strong RC6 RSA RSA Asymmetric Cryptography ECC ECC Not Strong D- H n RSA512 is broken in 1999 n RSA768 is broken in 2009 n RSA1024 is broken in. n All Asymmetric Cryptography at present can be broken by Shor s quantum algorithm n No asymmetric Cryptography can be uncondi2onal secure

7 Why QKD and Q- network Quantum key Distribu2on QKD seems to be the most outstanding Candidate for the future key infrastructure Post quantum cryptography achievable Low total cost Quantum Noise Encryp2on achievable Low cost Maybe an2- quantum afack Proved uncondi2onal security An2- quantum afack achievable Low cost

8 The goals: Secure communica2on networks over Quantum key infrastructure Service Applica2on Phone\Video\Data transmit\e- Bank\Smart Grid\... Encryp2on\Authen2ca2on\Signature\... Secure Communica2on networks Key Management QKD network Bofom tech Genera2on\distribu2on\Storage\usage\discard QLAN\QMAN\QWAN QKD Module\Convergence node\trusted Relay Op2cal Switch\Quantum Repeater Key infrastructure

9 The Roadmap of QKD network in China 2006 n World s first Decoy QKD experiment over 100km n Quantum phone network( 3- nodes) p Na2onal Quantum Backbone network (Over 2000km) n World s first Decoy QKD experiment over 200km n All pass Metro- area QKD network (5 nodes) n Hefei Metro- Quantum network(46 nodes) n Jinan Metro- Quantum network (56 nodes,>90users) 7 24 running for 9 month already S N

10 2 Product landscape and design QLAN QMAN QWAN Applica2on All- pass Op2cal Switch n 16 FC- PC op2cal interface n Op2cal loss less than 1.5dB n Ethernet Control interface QKG server Ethernet fiber fiber fiber QKD QKD. Maximally connect 16 QKD terminal QKD

11 2 Product landscape and design QLAN QMAN QWAN Applica2on Terminal QKD transceiver n BB84 Decoy state protocol n Special design for all- pass type QLAN n Higher rate and less cost n Resistant to all known quantum hacker n Fully hardware designed n Op2cal path loss tolerance up to 18dB LD OA VOA VOA OA LD Circulator Circulator EPC Bi- direc2on Quantum Channel EPC Mul2- channel SPD Mul2- channel SPD

12 2 Product landscape and design QLAN QMAN QWAN Applica2on Centralized Control Sta2on n Convergence node and trusted relay in MAN n Time Division Mul2plexing to reduce total- cost

13 2 Product landscape and design QLAN QMAN QWAN Applica2on Why trusted relay? There was a gap between the period of prac:cal Quantum computer and Quantum repeater, meanwhile the trusted relay is the best choice A huge quantum computer like this may be fatal to asymmetric cryptography But a quantum repeater of similar size can not be set up in the most today telecom carrier room

14 2 Product landscape and design QLAN QMAN QWAN Applica2on GHz QKD Module n Design for Backbone QKD network n Op2cal path Loss tolerance up to more than 25dB n Final key rate up to 1Mbps n Fully hardware designed n ATCA adapt n Easy installa2on and maintenance Data process module Single Photon Detector Module

15 2 Product landscape and design QLAN QMAN QWAN Applica2on Quantum Ethernet Encryptor n Integrated design(qkd and Encryptor in one Chassis) n Hardware(FPGA) Encryp2on up to 10Gbps n Key(128bits) refresh rate up to 1000key/s n Ethernet network interface n Comply with Chinese na2onal standards with the cer2ficate QNE- 1000D LAN QNE- 1000D QNE- 1000D LAN

16 2 Product landscape and design QLAN QMAN QWAN Applica2on Quantum VPN n Dual key(ike key and Quantum key) n encryp2on up to 10Gbps(CBC mode) n Key refresh rate up to 100key/s n Ethernet\SFP\XFP network interface n Stackable

17 3 Commercial service case Government applica2on case Government agency 1# GRE Tunnel B J B ranch SDH Link Office Quantum VPN Ethernet swi tch HA Internet (ChinaUnicom) Quantum VPN Ethernet swi tch HA Ethernet swi tch Keep al i ve HA Quantum VPN QKD and KM Client QKD and KM client QKD and KM client QMAN

18 3 Commercial service case Local bank applica2on case

19 3 Commercial service case Backbone Bank applica2on case

20 4 Collabora2on and Market CSRC

21 Thanks for your Website: info.com

1.Context... 3. What is the problem with current cryptographic techniques?... 3. 2.Current Quantum Key Distribution (QKD)... 4

1.Context... 3. What is the problem with current cryptographic techniques?... 3. 2.Current Quantum Key Distribution (QKD)... 4 Page 2 Table of contents 1.Context... 3 What is the problem with current cryptographic techniques?... 3 2.Current Quantum Key Distribution (QKD)... 4 What is Quantum Cryptography?... 4 How does QKD improve

More information

SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS

SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS AUDIENCE Data networks consultants, Network architects, designers and administrators/ managers, Systems Integrators (SI) and networks

More information

High speed link encryption State of the art. ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com

High speed link encryption State of the art. ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com High speed link encryption State of the art ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com Agenda Company Solutions Risks Encryption Today (State of the Art) Quantum Cryptography, QKD

More information

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 Quantum Safe Security Workgroup Presentation Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 ID Quantique Photon Counters Services Quantum Random Number Generators Technology

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

Securing Your Data In Transit For The Long Term

Securing Your Data In Transit For The Long Term Securing Your Data In Transit For The Long Term Or what happens when RSA encryption is finally broken by mathematicians or quantum computers? October 2014 ID Quantique Photon Counters Services Quantum

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

Spectrum Scarcity and Free Space Op1cal Communica1ons. Mohamed- Slim Alouini KAUST January 2014

Spectrum Scarcity and Free Space Op1cal Communica1ons. Mohamed- Slim Alouini KAUST January 2014 Spectrum Scarcity and Free Space Op1cal Communica1ons Mohamed- Slim Alouini KAUST January 2014 Agenda Spectrum Scarcity RF spectrum Mobile traffic growth and spectrum scarcity Cogni1ve Radio Networks (CRNs)

More information

1.264 Lecture 34. Telecom: Connecting wired LAN, WAN. Next class: Green chapter 17. Exercise due before class

1.264 Lecture 34. Telecom: Connecting wired LAN, WAN. Next class: Green chapter 17. Exercise due before class 1.264 Lecture 34 Telecom: Connecting wired LAN, WAN Next class: Green chapter 17. Exercise due before class 1 Exercise Your transportation brokerage company also handles billing for freight shipments,

More information

By: Mohsen Aminifar Fall 2014

By: Mohsen Aminifar Fall 2014 By: Mohsen Aminifar Fall 2014 Contact Information: E-Mail: [email protected] [email protected] Phone : 021-22919726 09128442885 Website : http://parsenet.ir http://aminifar.ir SMS Center : 5000262175

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

COMPSCI 111 / 111G An introduc)on to prac)cal compu)ng

COMPSCI 111 / 111G An introduc)on to prac)cal compu)ng COMPSCI 111 / 111G An introduc)on to prac)cal compu)ng Introduc)on to Networking and the Internet 3/8/15 1 From the Telephone to the Internet 1876: First successful bi- direc;onal transmission of clear

More information

Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell

Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell Quantum Key Distribution as a Next-Generation Cryptographic Protocol Andrew Campbell Abstract Promising advances in the field of quantum computing indicate a growing threat to cryptographic protocols based

More information

1.264 Lecture 35. Telecom: Fiber optics. Next class: Green chapter 18-21. Exercise due before class

1.264 Lecture 35. Telecom: Fiber optics. Next class: Green chapter 18-21. Exercise due before class 1.264 Lecture 35 Telecom: Fiber optics Next class: Green chapter 18-21. Exercise due before class 1 T1 T1 is shorthand for 1.5 Mbps connection T1 is the standard over copper T1 is used as a shorthand for

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer Layer 2 Network Encryption where safety is not an optical illusion Todays Agenda Fibre is safe

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

Security & Surveillance Cabling Systems

Security & Surveillance Cabling Systems Security & Surveillance Cabling Systems Security and Surveillance Cabling Systems The video security industry is growing and ever-changing, offering a wealth of opportunity for today s security professionals.

More information

How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)

How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol) WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security

More information

Lucent VPN Firewall Security in 802.11x Wireless Networks

Lucent VPN Firewall Security in 802.11x Wireless Networks Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper

More information

Network Design. Yiannos Mylonas

Network Design. Yiannos Mylonas Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which

More information

Quantum Enabled Security Solutions. Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com

Quantum Enabled Security Solutions. Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com Quantum Enabled Security Solutions Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com 10 Years of Quantum Innovation IDQ presents its first quantum cryptography (QC) prototype First QC system sold

More information

ROGERS DELIVERS THE SPEED, POWER AND RELIABILITY OF FIBRE RIGHT TO YOU.

ROGERS DELIVERS THE SPEED, POWER AND RELIABILITY OF FIBRE RIGHT TO YOU. ROGERS DELIVERS THE SPEED, POWER AND RELIABILITY OF FIBRE RIGHT TO YOU. ROGERS BUSINESS SOLUTIONS When you partner with Rogers Business Solutions, you benefit from on-going collaboration with our team

More information

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER 1 ETHERNET ENCRYPTION MODES TECHNICAL-PAPER The CN series encryption platform is designed to secure information transmitted over a number of network protocols. The CN series encryptors secure Ethernet

More information

Secure web transactions system

Secure web transactions system Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends

More information

24 th IEEE Annual Computer Communications Workshop (CCW)

24 th IEEE Annual Computer Communications Workshop (CCW) 24 th IEEE Annual Computer Communications Workshop (CCW) Exploration of Quantum Cryptography in Network Security Presented by Mehrdad S. Sharbaf Sharbaf & Associates Loyola Marymount University California

More information

Network edge and network core. millions of connected compu?ng devices: hosts = end systems running network apps

Network edge and network core. millions of connected compu?ng devices: hosts = end systems running network apps Computer Networks 1-1 What s the Internet: nuts and bolts view PC server wireless laptop cellular handheld access points wired links millions of connected compu?ng devices: hosts = end systems running

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

1.264 Lecture 36 (Solutions)

1.264 Lecture 36 (Solutions) 1.264 Lecture 36 (Solutions) Telecom: Wireless networks Next class: Green chapter 31,33, 36, 39. No exercise. 1 Exercise Design a system for an intercity rail passenger train to provide Internet access

More information

High Speed Encryption Made in Germany

High Speed Encryption Made in Germany High Speed Encryption Made in Germany Today s Trends in Network Encryption 2 Today s Trends in Network Encryption Contents Background ATMedia GmbH Why Encryption? Which Encryption? How to deploy Encryption

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

Virtual Privacy vs. Real Security

Virtual Privacy vs. Real Security Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing

More information

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification

More information

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF High Speed Ethernet Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF Hubs and Switches Hubs and Switches Shared Medium Hub The total capacity in the shared medium hub configuration (figure

More information

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik Privacy- Preserving P2P Data Sharing with OneSwarm Presented by Adnan Malik Privacy The protec?on of informa?on from unauthorized disclosure Centraliza?on and privacy threat Websites Facebook TwiFer Peer

More information

Enterprise Business Products 2014

Enterprise Business Products 2014 Enterprise Business Products 2014 Enterprise Ethernet Services EPL (Ethernet Private Line) - provides point-to-point connectivity between two business locations with scalable bandwidth speeds via an Ethernet

More information

How To Build A Network For Storage Area Network (San)

How To Build A Network For Storage Area Network (San) White Paper Data Storage across the MAN by deploying a SAN over Dark Fiber by Pieter Panis, EuroFiber 1/7 1 Introduction The purpose of this document is to illustrate how a storage area network (SAN) can

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

NEC Produktpor-olio. Compact ODU. ipasolink 400/400A. ipasolink EX. ipasolink 200. ipasolink 100E ipasolink 1000. ipasolink ix.

NEC Produktpor-olio. Compact ODU. ipasolink 400/400A. ipasolink EX. ipasolink 200. ipasolink 100E ipasolink 1000. ipasolink ix. NEC Produktpor-olio Compact ODU ipasolink 400/400A ipasolink EX ipasolink 200 ipasolink 100E ipasolink 1000 ipasolink ix ipasolink SX ipasolink GX Inves55onssicherheit NEC ipasolink Ø Carrier Class Equipment

More information

Marker Drivers and Requirements. Encryption and QKD. Enterprise Connectivity Applications

Marker Drivers and Requirements. Encryption and QKD. Enterprise Connectivity Applications Marker Drivers and Requirements for Encryption and QKD in Enterprise Connectivity Applications Christian Illmer September 2009 ADVA Optical Networking ADVA is a leading global provider of xwdm optical

More information

NEW WORLD TELECOMMUNICATIONS LIMITED. 2 nd Trial Test Report on 3.5GHz Broadband Wireless Access Technology

NEW WORLD TELECOMMUNICATIONS LIMITED. 2 nd Trial Test Report on 3.5GHz Broadband Wireless Access Technology NEW WORLD TELECOMMUNICATIONS LIMITED 2 nd Trial Test Report on 3.5GHz Broadband Wireless Access Technology Issue Number: 01 Issue Date: 20 April 2006 New World Telecommunications Ltd Page 1 of 9 Issue

More information

Value Proposition for Data Centers

Value Proposition for Data Centers Value Proposition for Data Centers C ollocation or a trend of hosting customers servers at a provider s physical location has been steadily growing in the recent years due to its many benefits. The collocation

More information

Layer 3 Network + Dedicated Internet Connectivity

Layer 3 Network + Dedicated Internet Connectivity Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for

More information

IT 3202 Internet Working (New)

IT 3202 Internet Working (New) [All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any

More information

EECC694 - Shaaban. Transmission Channel

EECC694 - Shaaban. Transmission Channel The Physical Layer: Data Transmission Basics Encode data as energy at the data (information) source and transmit the encoded energy using transmitter hardware: Possible Energy Forms: Electrical, light,

More information

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include

More information

Your Wide Area Network Just Got a Whole Lot Wider.

Your Wide Area Network Just Got a Whole Lot Wider. Your Wide Area Network Just Got a Whole Lot Wider. Rely on XO for networking solutions that will enhance your business today and tomorrow. Contact your local XO sales representative or visit us at www.xo.com

More information

INTRODUCTION TO MEDIA CONVERSION

INTRODUCTION TO MEDIA CONVERSION WHITE PAPER INTRODUCTION TO MEDIA CONVERSION Table of Contents Introduction 1 What is a Media Converter? 1 Advantages of Media Conversion Technology 1 Benefits of Fiber Optic Cabling 2 Types of Media Converters

More information

Network Topologies. Network Topologies

Network Topologies. Network Topologies Network Topologies LANs and WANs - Geographical coverage LANs A single geographical location, such as office building, school, etc Typically High speed and cheaper. WANs Spans more than one geographical

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

NETWORKING TECHNOLOGIES

NETWORKING TECHNOLOGIES NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.

More information

Chapter 1 Instructor Version

Chapter 1 Instructor Version Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic

More information

Study on Remote Access for Library Based on SSL VPN

Study on Remote Access for Library Based on SSL VPN , pp.111-122 http://dx.doi.org/10.14257/ijca.2016.9.1.11 Study on Remote Access for Library Based on SSL VPN Mei Zhang Library, Linyi University, Shandong, 276000, China [email protected] Abstract With

More information

25 Years of Manufacturing Excellence. Premier Quatro Addressable Fire Alarm System. Assessed to ISO 9001: 2008

25 Years of Manufacturing Excellence. Premier Quatro Addressable Fire Alarm System. Assessed to ISO 9001: 2008 Premier Quatro Addressable Fire Alarm System Premier Quatro 4 Loop Analogue Addressable Fire Alarm Panel The Premier Quatro is the new 4 loop analogue Alarm Systems. It is available in 1, 2, 3 or 4 loop

More information

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server

More information

Minor in ii INFORMATION SECURITY i at ESIEA Laval, France

Minor in ii INFORMATION SECURITY i at ESIEA Laval, France Minor in ii INFORMATION SECURITY i at ESIEA Laval, France Program Strengths Provides a thorough overview of information and network security, from secure programming to risk management within a company.

More information

EXINDA NETWORKS. Deployment Topologies

EXINDA NETWORKS. Deployment Topologies EXINDA NETWORKS Deployment Topologies September 2005 :: Award Winning Application Traffic Management Solutions :: :: www.exinda.com :: Exinda Networks :: [email protected] :: 2005 Exinda Networks Pty Ltd.

More information

The WI-PIE Program. Backbone Technical description

The WI-PIE Program. Backbone Technical description The WI-PIE Program Backbone Technical description Turin 19 mar 2010 Davide La Valle Architecture and Network design group Infrastructural Services Division [email protected] Agenda Regional Backbone

More information

Failsafe WAN, VoIP, IVRS & LAN connectivity

Failsafe WAN, VoIP, IVRS & LAN connectivity Failsafe WAN, VoIP, IVRS & LAN connectivity Client : Asia 's biggest integrated Jewellery manufacturer Customer's requirement: The customer wanted to establish WAN and VoIP connectivity between their offices

More information

The Seven Habits of State-of-the-Art Mobile App Security

The Seven Habits of State-of-the-Art Mobile App Security #mstrworld The Seven Habits of State-of-the-Art Mobile App Security Mobile Security 8 July 2014 Anand Dwivedi, Product Manager, MicroStrategy strworld Agenda - Seven Habits of State of the Art Mobile App

More information

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN) Chapter 11: WAN Abdullah Konak School of Information Sciences and Technology Penn State Berks Wide Area Networks (WAN) The scope of a WAN covers large geographic areas including national and international

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications

More information

Broadband Cable Service Deployment at WorldCall Telecom - Pakistan. Hassan Zaheer Manager Operations Broadband Division

Broadband Cable Service Deployment at WorldCall Telecom - Pakistan. Hassan Zaheer Manager Operations Broadband Division Broadband Cable Service Deployment at WorldCall Telecom - Pakistan Hassan Zaheer Manager Operations Broadband Division Broadband Cable Cable services provides Intelligent network Mix of IP and MPEG Multiple

More information

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most

More information

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain

More information

Resilient Metropolitan Area Networks

Resilient Metropolitan Area Networks Resilient Metropolitan Area Networks t. 902.442.1540 f. 902.442.1559 w. www.internetworking-atlantic.com 1 Resilient Metropolitan Area Networks Technologies for wide area network (WAN) and metropolitan

More information

10G CWDM Conversion Technology

10G CWDM Conversion Technology 10G CWDM Conversion Technology Simplifying Today s Challenges By Transition Networks Curt Carlson Product Manager [email protected] com Agenda WDM Technology Overview What are the features/benefits

More information

Migration to 40/100G in the Data Center with OM3 and OM4 Optical Connectivity

Migration to 40/100G in the Data Center with OM3 and OM4 Optical Connectivity Migration to 40/100G in the Data Center with OM3 and OM4 Optical Connectivity Needs in the Data Center With the continued requirement for expansion and growth in the data center, infrastructures must provide

More information

White Paper. OPCOM3500 Multi-Service Access Platform INTRODUCTION CHARACTERISTICS

White Paper. OPCOM3500 Multi-Service Access Platform INTRODUCTION CHARACTERISTICS OPCOM3500 Multi-Service Access Platform INTRODUCTION Until recently, the service model for carriers and service providers focuses on delivering bandwidth to a stable, predictable customer base through

More information

Market Central www.secureswitch.com

Market Central www.secureswitch.com Market Central www.secureswitch.com 500 Business Center Drive Pittsburgh, PA 15205 USA 412.494.2800 CAGE 1BGJ7 APPLICATION NOTES SwitchMaster R5000 Series & Switching Systems SwitchMaster R5000 Series

More information

Using Omnisec 422 and 423 IP Encryptors Over BGAN

Using Omnisec 422 and 423 IP Encryptors Over BGAN Using Omnisec 422 and 423 IP Encryptors Over BGAN Version 02 29 th December 2009 Contents 1 Overview 1 2 Benefits to BGAN Users 1 3 Possible Application Scenarios 1 4 Typical Users 1 5 Product Range 1

More information

Building Voice VPN with Simton IPX

Building Voice VPN with Simton IPX Building Voice VPN with Simton IPX (Simton Technologies, Inc.) Version 6 With Simton IPX, the small and medium businesses can easily consolidate data and voice network together to increase productivity,

More information

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)

More information

Appendix 3. Specifications for e-portal

Appendix 3. Specifications for e-portal Appendix 3. Specifications for e-portal 1. e-portal H/W and S/W No Equipment Specification Unit Q'ty 1 Web Server for users and administrator 2 WAS Server 3 LMS Server 4 DB Server 4U Rack Type 8 Core Intel

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

C20.0001 Information Systems for Managers Fall 1999

C20.0001 Information Systems for Managers Fall 1999 New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in

More information

10 Gigabit Ethernet: Scaling across LAN, MAN, WAN

10 Gigabit Ethernet: Scaling across LAN, MAN, WAN Arasan Chip Systems Inc. White Paper 10 Gigabit Ethernet: Scaling across LAN, MAN, WAN By Dennis McCarty March 2011 Overview Ethernet is one of the few protocols that has increased its bandwidth, while

More information

Using BroadSAFE TM Technology 07/18/05

Using BroadSAFE TM Technology 07/18/05 Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security

More information

Chapter 4 Connecting to the Internet through an ISP

Chapter 4 Connecting to the Internet through an ISP Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No

More information

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007. Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

More information

Virtual Private Networks

Virtual Private Networks Virtual Private Networks Rene Bahena Felipe Flores COEN 150 Project Report Chapter 1: What is a VPN? VPN stands for Virtual Private Network and is a way of making a secure remote connection to a private

More information

Introduction. Background

Introduction. Background Introduction By far, the most widely used networking technology in Wide Area Networks (WANs) is SONET/SDH. With the growth of Ethernet now into Metropolitan Area Networks (MANs) there is a growing need

More information

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network. Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

Converged TDM and IP- Based Broadband Solutions White Paper. OnSite OS-10 Multi-Service over SDH Provisioning

Converged TDM and IP- Based Broadband Solutions White Paper. OnSite OS-10 Multi-Service over SDH Provisioning Converged TDM and IP- Based Broadband Solutions White Paper OnSite -10 Multi-Service over SDH Provisioning Copyright Copyright 2009, Patton Electronics Company. All rights reserved. Printed in the USA.

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

Flexible SDN Transport Networks With Optical Circuit Switching

Flexible SDN Transport Networks With Optical Circuit Switching Flexible SDN Transport Networks With Optical Circuit Switching Multi-Layer, Multi-Vendor, Multi-Domain SDN Transport Optimization SDN AT LIGHT SPEED TM 2015 CALIENT Technologies 1 INTRODUCTION The economic

More information

University-Industry Interaction: The Case of Optical Communications in Brazil

University-Industry Interaction: The Case of Optical Communications in Brazil Prof. Hugo Fragnito; 29/05/15 [1] Na#onal Ins#tute of Photonics Science and Technology for Op#cal Communica#ons Ins#tuto Nacional de Ciência e Tecnologia Fotônica para Comunicações Óp#cas University-Industry

More information

Expert Reference Series of White Papers. Planning for the Redeployment of Technical Personnel in the Modern Data Center

Expert Reference Series of White Papers. Planning for the Redeployment of Technical Personnel in the Modern Data Center Expert Reference Series of White Papers Planning for the Redeployment of Technical Personnel in the Modern Data Center [email protected] www.globalknowledge.net Planning for the Redeployment of

More information

LONI Provides UNO High Speed Business Con9nuity A=er Katrina. Speakers: Lonnie Leger, LONI Chris Marshall, UNO

LONI Provides UNO High Speed Business Con9nuity A=er Katrina. Speakers: Lonnie Leger, LONI Chris Marshall, UNO LONI Provides UNO High Speed Business Con9nuity A=er Katrina Speakers: Lonnie Leger, LONI Chris Marshall, UNO Presentation Order Business Con:nuity UNO LONI LONI + UNO Q & A Hurricane Katrina Impact LONI

More information

Polish National Data Storage. Norbert Meyer, Maciej Brzeźniak, Maciej Stroiński PSNC

Polish National Data Storage. Norbert Meyer, Maciej Brzeźniak, Maciej Stroiński PSNC Polish National Data Storage Norbert Meyer, Maciej Brzeźniak, Maciej Stroiński PSNC Workshop on Big Data and Open Data, Brussels. May 7-8, 2014 Data = value => needs protection! Data is value:! Expensive

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information