Next Generation Networking

Slides:



Advertisements
Similar presentations
The Enterprise Guide to Video Conferencing Created using iThoughts [...] [...]
Advertisements

Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
1 Chapter 19 Networks. 2 What’s Inside and on the CD? In this chapter you’ll learn: –Basic network terminology –To identify network components –About.
Telecommunications and Networks Business value of networks Network components Chapter 6 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies,
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
Using RADIUS Within the Framework of the School Environment Charles Bolen Systems Engineer December 6, 2011.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
Clinic Security and Policy Enforcement in Windows Server 2008.
1 Telecommunications, the Internet, Intranets, and Extranets CSC101 SECTIONS 01 & 02.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
MikroTik Experience Overview - Wireless ISP Solutions
Sarkis Mkoyan *Yerevan Physics Institute. 2 Alikhanyan Brothers St., YerPhI Network Overview.
January 2001 Richard Paine, BoeingSlide 1 doc.: IEEE /050 Submission Boeing Enterprise User Scenario Wireless VOIP Mobile Nets DEN Richard Paine.
Chapter 6 Telecommunications and Networks. 2 I. Networking the Organization  Merging computing and communications yields computer networks which are.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Phantom Works Mathematics & Computing Technology September 1999 Richard Paine, BoeingSlide 1 doc.: IEEE /198 Submission Requirements for an IAPP.
Module 11: Remote Access Fundamentals
Firewall Network Processor™: Technical Concept and Business Solutions FNP™ – is a trademark of Fractel Inc. December 2008 Columbus.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Jan 2008 Richard Paine, BoeingSlide 1 doc.: IEEE /0120r1 Submission Next Generation Security for What is 21 st Century Security?
Computers Are Your Future Eleventh Edition
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Configuring Network Access Protection
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Computer networks Internet, Intranet, Extranet, Lan, Wan, characteristics and differences.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Module 10: Providing Secure Access to Remote Offices.
January 2003 Richard Paine, Boeing Slide 1 doc.: IEEE /087r0 Submission Slide 1 Richard Paine, Boeing Voice Over IP Scenario For IEEE k.
NETWORKING & SYSTEM UPDATES
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Building Corporate Data Networks – A Case Study
Doc.: IEEE /203 Submission March 2001 Don Berry, MicrosoftSlide 1 P802 Wireless LAN Wireless Local Area Network Status Report Hilton Head Marriot.
Chapter5 TELECOMMUNICATIONS AND NETWORKS. Content Networking the Enterprise Trends in Telecommunications The Business Value of Telecommunications Networks.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
WHAT’S A WIRELESS AP? AND WHY DO I NEED ONE? Network Components & How They Work.
Chapter 7. Identifying Assets and Activities to Be Protected
Chapter 1 Introduction to Networking
Module 9: Configuring Network Access
Virtual Private Network (VPN)
Network Infrastructure
5G MOBILE TECHNOLOGY By J.YOGESH 08M31A0425.
Implementing Network Access Protection
Securing the Network Perimeter with ISA 2004
Configuring and Troubleshooting Routing and Remote Access
E-Commerce.
Wireless Fidelity 1 1.
Location-Enabled Network Services
Telecommunications, the Internet, and Wireless Technology
Technology Architecture Guidebook
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
IS4550 Security Policies and Implementation
Virtual Private Network (VPN)
Server-to-Client Remote Access and DirectAccess
ISMS Information Security Management System
IS4680 Security Auditing for Compliance
Seminar Class CS591 Presentation Topic: VPN
Virtual Private Network
Firewalls Routers, Switches, Hubs VPNs
UWB Teleconference Report
EUT 122 Skills and Technology in Communication
Telecommunications, the Internet, and Wireless Technology
Designing IIS Security (IIS – Internet Information Service)
Topic 12: Virtual Private Networks
Securing web applications Externally
Mobile and Wireless Sheizaf Rafaeli E-Business.
Global One Communications
Presentation transcript:

Next Generation Networking January 2002 doc.: IEEE 802.11-02/101r0 Next Generation Networking + Submission Slide 1 Richard Paine, Boeing

Next Generation Technology Trends Wireless + Very High Bandwidth Backbones: Mobile and Wireless Networks Internet2 High Bandwidth Experiments

New 5 Year Technologies UWB Adaptive Wireless Networks Unlimited Wired Bandwidth Metadirectories Firewalls down Role Based Access Control Policy-Based Security Policy-based Quality Of Service Collaboration over Wireless Home Networking VOIP over Wireless MANET Seamless Mobility Software Radios

Boeing Wireless Railroad Chart 1-3 GHz x >100Mbps UWB 5.15 GHz x 100 Mbps DFS & TPC (adaptive) 5.15 GHz x 54Mbps 802.11a 2.4 GHz X 24Mbps Adaptive 802.11g 2.4 GHz x 11 mb (802.11b) Lucent/Cisco 50,000 potential Boeing users (laptops+PDAs), 1,000 APs deployed UWB 5GHz Bluetooth 2.4 GHz x 11Mbps Adaptive Bluetooth 2.4 GHz x 700Kbps Bluetooth 2000 2001 2002 2003 2004 2005 2006 2007 Wireless Vision and Architecture published by M&CT 11/94

What is Internet2? Abilene IP-over-SONET (OC-48c) backbone 51 direct connections (3 pending) 3 OC-48c connections (most recent: MAX) 22 will connect via at least OC-12c by year end 198 primary participants All 50 states, District of Columbia, & now Puerto Rico 15 regional GigaPoPs support ~70% of participants 37 sponsored participants 14 state education networks (SEGPs) Collaboration of sponsoring member universities and Abilene connectors

Abilene Network of Internet2

Boeing Internet2 Technologies Legion Clusters Access Grid - Demonstrated HDTV

Boeing Internet2 Research Network Catalyst 5000 August 17, 2001 DNS AD/DNS PKI RA Multimedia w/s Web Privacy Manager PKI CA, RS, LDAP Logging F irewall VPN gateway Router Hub Analysis (Shadow) IDS (Snort) Future Access Grid OC3 100 Mb ATM Switch FreeBSD DummyNet QPM Remote R3 iPlanet Directory AD Streaming Video Windows Media Server R1 R2 w/ PEPs AP SX/12 CS Link Emulator Mobile Laptop Not Shielded Shielded

Metadirectory Aircraft Scenario

Metadirectory Lab Demonstration Store/Maintain Manifest Jan 2002 doc.: IEEE 802.11-02/XXX Metadirectory Lab Demonstration Airport DB iPlanet Airline Maintenance DB NDS Airline Counter Airline Directory AD Catering DB Oracle Directory Onboard Web Reservations Airline DB SQL Metamerge Move Manifest Onboard Wirelessly Build Manifest Store/Maintain Manifest Onboard Manifest Submission Slide 10 Richard Paine, Boeing

Seamless Mobility Netmotion Wireless

Seamless Mobility Netmotion Wireless

Collaboration on Internet2 Access Grid

Breaking Down Firewalls Hardening End Systems Policy-Based Network Security

Breaking Down the Firewalls SANS Methodology Configure the secure domain server on "labnet" Add PCs to domain Secure the Unix machine Install personal firewall on the PCs Designate a manager for each machine Connect "labnet" to Internet2 Test the connections Install the antivirus software on the PCs and configure for auto update Vulnerability scan on each machine

Policy Enforcement Point Big Picture BOEING ENTERPRISE PEP DEPARTMENTAL PEP MACHINE PEP

Machine Policy Enforcement Point Security Domain Security Cells Corporate Networks past Enterprise + Departmental PEPs Corporate Networks Shared Design Systems Email Data Sharing Special Contracts Machine PEP Internal Switches Secure Data Drops Shared (DMZ) LAN Machine PEP: -Strong Authentication (when machine becomes idle) -User Authorization -User transparent -Path Authorization -SSL/IPSEC Encryption -Event Alarming -Intrusion Detection Red – Available Today The machine level PEP is connected to switches and exists on an individual machine. The access is via the enterprise network and the departmental network. Today, strong authentication is provided by the operating system when the machine is idle. Otherwise, none of the services are available today.

Boeing Enterprise (Intranet & Extranet) PEP Tunnels ISP Boeing Mobile Employees, Customers, & Suppliers Logical Tunnel Internet Boeing Entity (campus, building, aircraft, etc) Private address space

Mobile Ad Hoc Networks Novaroam Routers 900MHz Radios Temporally Ordered Routing Algorithm (TORA) Churn

Summary Next Generation Wireless LANs Include UWB Adaptive Wireless Networks Metadirectories Seamless Mobility Firewalls down Policy-based Quality Of Service Collaboration over Wireless Home Networking VOIP over Wireless MANET