Comparison of price, topology and architecture with Telekom Malaysia (TM) Topology And Architecture. Basically TM does not offer the same solution as offered.

Slides:



Advertisements
Similar presentations
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Advertisements

The Business Solutions Revolution Xavier Villegas Chief Business Market Officer September 17, 2013.
Internetworking II: MPLS, Security, and Traffic Engineering
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Guide to Network Defense and Countermeasures Second Edition
Review: Routing algorithms Distance Vector algorithm. –What information is maintained in each router? –How to distribute the global network information?
Page 1 / 14 The Mesh Comparison PLANET’s Layer 3 MAP products v.s. 3 rd ’s Layer 2 Mesh.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
1 DSL BASED NETWORK FOR 2 Vision Statement Specializing in broadband network solutions including high-speed internet access, data, voice and video services,
1 DSL BASED NETWORK FOR Air Line Pilots Association International.
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—3-1 Medium-Sized Routed Network Construction Reviewing Routing Operations.
Alcatel IP Network Division — 1 - Next Generation Services for IP/MPLS Core Networks- Iulian Costea Project Manager - IP Network Division
Arsitektur Jaringan Terkini
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
VPNs Virtual Private Networks. VPNs: Purpose Emulate a private network using shared Service Provider infrastructure Same policies as private network What.
Computers © 2005 Prentice-Hall, Inc.Slide 1. Computers Chapter 6 Networks and Networking © 2005 Prentice-Hall, Inc.Slide 2.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networking Karlene R. Samuels COSC513.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
A Policy-Based Optical VPN Management Architecture.
NEtwork MObility By: Kristin Belanger. Contents Introduction Introduction Mobile Devices Mobile Devices Objectives Objectives Security Security Solution.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
Remote Networking Architectures
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-1 Determining IP Routes Introducing Distance Vector Routing.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
Module 3: Planning and Troubleshooting Routing and Switching.
 1. Ray Chia Gheng YiSN  2. Ong Chin HaoSN  3. Nurashiken SubariSN  4. Mohamed Ali BabikerSN
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
March, 2006 Internet Infra Team Marketing Group March, 2006 Internet Infra Team Marketing Group OfficeServ 7400 in MAXON CIC.
Workshop PRIXNET Distributed Virtual Circuit Switching protocol with auction pricing Loubna ECHABBI Dominique BARTH Laboratoire PRISM.
Virtual Private Networks Warren Toomey. Available WAN Links.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Your Database Solution Jason King. Benefits of a Database Centralized information Searchable Save space from multiple orders from one client.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
PVN Overview IP-VPN : IP over Virtual Private Network IP-VPN over Frame Relay IP-VPN over ATM MPLS IP-VPN over Gigabit Network IP-VPN over TDM.
Broadband Access Solutions via Satellite Sergey Eleferov Russian Satellite Communications Company Satellite Communications Centre “DUBNA”
Economics of the Internet. 2 How Is Internet Access Priced? Connection pricing –a fixed-bandwidth connection is charged an annual fee committed information.
Applications over the WAN Growth is in ‘Voice over the WAN’ (doubling over the next year) Mature applications expected to remain stable Some growth in.
MPLS VPN Presented by : Md. Shafiqur Rahman Divisional Engineer (A & C) Moghbazar, Dhaka-1217.
Virtual Private Network and Customer Relationship Management By: Saeed Baayoun.
Static and Dynamic Routing. Configuring RIP Specifying Outgoing Interface.
WIRELESS NETWORK SECURITY TSS 3243 HOME WIRELESS GATEWAY VS ENTERPRISE WIRELESS GATEWAY PREPARED BY: WAN FATHUN NADYA BT WAN YAACOB 2TSK.
Integrated Campaign IPVPN Combo Promo. Objective of the Campaign Promo Description Promo Objective Promo Offering  Upgrade Package  BOD Package IPVPN.
Network Troubleshooting CT NWT NameTP No. Gan Pei ShanTP Tan Ming FattTP Elamparithi A/L ThuraisamyTP Tan Ken SingTP
IP Communications slides
Configured as specific static route
Planning and Troubleshooting Routing and Switching
Wide Area Network.
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Net 412 (Practical Part) Networks and Communication Department LAB 2.
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
PPPoE Internet Point to Point Protocol over Ethernet
The Business Value of MPLS VPNs
Virtual Private Network
© 2006 ITT Educational Services Inc.
IP Communications slides
MetTel Cloud Connect Seamlessly Secure Your Path to Cloud Providers
Virtual Private Network
Topic 12: Virtual Private Networks
Private Networks.
OCI – VPN Connect Internet Customer Premises
Presentation transcript:

Comparison of price, topology and architecture with Telekom Malaysia (TM) Topology And Architecture. Basically TM does not offer the same solution as offered by Aienet IPVPN, but the most competitive product offered by TM to this solution is TM IPVPN VALUE. The so called product IP VALUE has two major weaknesses on topology and architecture that makes the network line slow and congested. The first shortcoming is the bottleneck issue that came from the basic topology itself where by every single pc in the whole network (HQ and branches) share the same single gateway to access the internet that created congestion issue when more branches established in the network. The second is the architecture, by using the central Managed Internet Access (MIA) has generated more complicated problems as more clients raised. Problems will accumulate when every new client must have specific configuration on paths and routings. Eventually, when more and many more clients attached to the MIA network, the network become congest and instable and this happened to some customers where some applications failed to operate via MIA network. The problem is describe in the diagram below. Solving These Problems. The Aienet IPVPN is designed to overcome the said problems and to offer lower price especially for companies or department s that allocate small amount of budget for their internet connection. 1.Bottleneck issue solved by creating 2 automated and integrated gateways at every branch which is controlled inside the vpn router. 2.The problem on paths and routings is solve by creating vpn tunnel for every branch which eliminate the need to manage paths and routings in MIA architectures. See the diagram how these two problems were solved with Aienet IPVPN.

TM IP VPN VALUE – TOPOLOGY AND ARCHITECTURE

Aienet IPVPN ( Virtual Private Network Over Streamyx Connection)

IPVPN (Streamyx Over Leased Line Connection)

Price Comparison. If TM want to change the topology and architecture to meet the Aienet IPVPN Solution, TM has to locate a router at every branch and will charge Router Rental Fee at every HQ and Branch. The table below show the comparison of the price between TM IP Value and Aienet Ipvpn if TM offer the same product solution. The Price for 2 locations. HQ and 1 branch. TM IPVPN VALUE No.Item DescriptionBandwidth & Line TypeMontly Fee (RM)Annual Fee (RM)Total RM / Year 1HQ Leased Line Rental1 MBps Leased Line 55, Branch Line Rental1 MBps Streamyx HQ Router Rental Branch Router Rental 9000 Total Annual Recurring Charge82800 Aienet IPVPN (Telecommunication Infrastructures are exactly same with TM IPVPN VALUE) No.Item DescriptionBandwidth & Line TypeMontly Fee (RM)Annual Fee (RM)Total RM / Year 1HQ Leased Line Rental1 MBps Leased Line 55, Branch Line Rental1 MBps Streamyx HQ Router Rental Branch Router Rental 4000 Total Annual Recurring Charge66776 Aienet IPVPN (HQ is connect via Streamyx for maximum budget's saving) - TM did not offer this solution. No.Item DescriptionBandwidth & Line TypeMontly Fee (RM)Annual Fee (RM)Total RM / Year 1HQ Leased Line Rental2 MBps Streamyx with 5 Fixed IPs Branch Line Rental1 MBps Streamyx HQ Router Rental Branch Router Rental 4000 Total Annual Recurring Charge24832