ALTTC BSNL. 1. Introduction 2. Methodology 3. Transition cost and penetration curve 4. Theoretical consideration 5. Migration for Large organization 6.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Cloud Computing: Theirs, Mine and Ours Belinda G. Watkins, VP EIS - Network Computing FedEx Services March 11, 2011.
NAT, firewalls and IPv6 Christian Huitema Architect, Windows Networking Microsoft Corporation.
IPv4 - IPv6 Integration and Coexistence Strategies Warakorn Sae-Tang Network Specialist Professional Service Department A Subsidiary.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
1 Ports and IPv6. 2 Ports Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), used for communication Generally speaking, a computer.
Could IPv6 Improve Network Security? And, If So, at What Cost? 3040 Cornwallis Road · Research Triangle Park, NC · Phone:
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
IPv4 Depletion IPv6 Adoption 3 February /8s Remaining.
IPv6-The Next Generation Protocol RAMYA MEKALA UIN:
IPv6 7/18/ Road map for IPv6 Migration in an Organization.
Enabling IPv6 in Corporate Intranet Networks
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
Understanding Internet Protocol
MUNIS Platform Migration Project WELCOME. Agenda Introductions Tyler Cloud Overview Munis New Features Questions.
TANDBERG Video Communication Server March TANDBERG Video Communication Server Background  SIP is the future protocol of video communication and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
A Guide to major network components
Module – 7 network-attached storage (NAS)
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
1Group 07 IPv6 2 1.ET/06/ ET/06/ ET/06/ EE/06/ EE/06/ EE/06/6473 Group 07 IPv6.
Network LANscape Servers & Equipment Found In a Typical Local Area Network (LAN) By George Squillace New Horizons of MichiganGeorge Squillace MCT, MCSE,
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
ALTTC BSNL.  Until IPv6 completely supplants IPv4, which is not likely to happen in the foreseeable future, a number of so-called transition mechanisms.
The Internet’s Hardware Much of the hardware components that make up the Internet are owned or shared by thousands of private and public organizations.
OSI AND TCP/IP MODELS. Outline Introduction OSI Model TCP/IP Model IPv4 vs. IPv6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
11 KDDI Trial Hub & Spoke Shu Yamamoto Carl Williams Hidetoshi Yokota KDDI R&D Labs.
IPv4 TO IPv6 TRANSITION AND INTEROPERABILITY FOR TELECOM SERVICE PROVIDER Business Problem In today’s environment of growing connectivity where almost.
IPv6 integration with the ATN Tony Whyman Helios Information Services Ltd.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Huda AL_Omairl - Network 71 Protocols and Network Software.
IPv6 and IPv4 Coexistence Wednesday, October 07, 2015 IPv6 and IPv4 Coexistence Motorola’s Views for Migration and Co-existence of 3GPP2 Networks to Support.
Module 11: Remote Access Fundamentals
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 12 Integrating the Organization from End to End – Enterprise Resource Planning.
APNIC Update The state of IP address distribution and IPv6 deployment status Miwa Fujii Senior IPv6 Program Specialist APNIC.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Network Fundamentals.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
IPv6 for ISP Industry Sify Technologies Ltd Somasundaram Padmanabhan Network Engineering IPv6 Awareness Workshop.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
ERP Implementation Fundamentals Richard Byrom Oracle Consultant, Speaker and Author
1 NCM _05_2001_c1 © 2001, Cisco Systems, Inc. All rights reserved. How would you prepare for the technology you need.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
Deploying IPv6, Now Christian Huitema Architect Windows Networking & Communications Microsoft Corporation.
Chapter 3 Selecting the Technology. Agenda Internet Technology –Architecture –Protocol –ATM IT for E-business –Selection Criteria –Platform –Middleware.
IPv6 - The Way Ahead Christian Huitema Architect Windows Networking & Communications
Selecting the Best Alternative Design Strategy. Two basic steps 1.Generate a comprehensive set of alternative design strategies 2.Select the one design.
17/10/031 Euronetlab – Implementation of Teredo
Association of Competitive Telecom Operators IPv6 & TELCOs Workshop On IPv6 New Delhi 21 st July 2009.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
BUSINESS INFORMATION SYSTEMS
WELCOME ALL.
Virtual Private Networks (VPN)
Virtual Private Networks
Working at a Small-to-Medium Business or ISP – Chapter 7
Introducing Novell IPv6 Stack
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Virtual Private Network
Agenda The current Windows XP and Windows XP Desktop situation
Internet Protocol version 6 (IPv6)
Presentation transcript:

ALTTC BSNL

1. Introduction 2. Methodology 3. Transition cost and penetration curve 4. Theoretical consideration 5. Migration for Large organization 6. Case study 7. Summary Agenda

 The current generation of IP, version 4 (IPv4), has been in use for almost 30 years and has supported the Internet’s growth over the last decade.  Internet experts generally agree that IPv6 based network would be technically superior to IPv4 based network.  Increase IPv6 address space and its header structure : ◦ will enable to develop new application, ◦ Will be more secure, ◦ have ease of mobility and renumbering, ◦ end to end connectivity ◦ Efficient and will provide other benefits  Cost estimates are primarily based on likely development and deployment Scenarios.

 H/w, software, services and other miscellaneous expanses.  Each organization/or user throughout the internet will incur some cost in transition  Primarily in the form of labor and capital expenditures.  Expenditure will vary greatly across and within stake holder groups depending on their existing infrastructure and IPv6 related needs.  ISPs has to incur largest transition cost.  Individual users will incur the minimum cost

Description of stakeholder groups  Infrastructure vendors,  Application vendors,  ISPs and  Internet users. ◦ Infrastructure vendors :  manufacturers of computer networking hardware (e.g., routers, firewalls, and servers) and systems software (e.g., operating system) that supply the components of computer networks. Major companies in this category include Microsoft, IBM, Juniper, Cisco, and Hewlett Packard.

◦ Application vendors: include suppliers of e- mail, file transfer protocol (FTP) and Web server software, and database software, such as enterprise resource planning (ERP) and product data management (PDM) software. SAP, Oracle, and Peoplesoft are some of the largest companies in this group. ◦ ISPs are companies that provide Internet connectivity to customers, larger companies, some institutional users, and national and regional. e.g., BSNL, Tata telecommunication, AirTel, Vodafone, Idea etc. ◦ Internet users Corporate, institutional, and government organizations, independent users including small businesses and residential households.

Primary business activities of each stakeholder group that will be affected It is emphasized that all stakeholders will bear costs associated with the transition of their own internal networks from IPv4 to IPv6

 Cost Categories ◦ Labor resources will account for the bulk of the transition costs ◦ Memory and hardware : Some additional physical resources, such as increased memory capacity for routers and other message-forwarding hardware. ◦ These expenses are treated as negligible in the cost analysis because it is quite small compared to the labor resources required. ◦ Labor resources needed for the transition are linked to three general business activities within the Internet supply chain—product development, Internet provisioning services, and internal network operations. ◦ other cost: Additionally, several other cost categories, such as network testing and standards and protocol development, span multiple business activities and thus several take holder groups.

 The penetration curves represent the estimated share of infrastructure products and applications that are IPv6 capable and the share of networks that are IPv6 enabled at a given time.  This implies that costs will be distributed over time as stakeholders gradually engage in transition activities.  As networking staff are trained and the system is reconfigured.  Lower costs associated with testing and monitoring are then experienced after the enabling date.

The penetration curves likely deployment/adoption rates for the four major stakeholder groups. The infrastructure (Inf) and applications (App) vendors’ curves represent the path over which vendor groups will offer IPv6-capable products to customers.

 The penetration of IPv6 is likely to be a gradual process and will probably never reach 100 percent of applications or users.  These four curves are the key penetration metrics for the cost analysis because they capture the timing of expenditures.  For vendors, R&D expenditures to integrate IPv6 into their products are the primary expenditure category associated with the transition from IPv4 to IPv6.

StockholderRelative cost HardwaresoftwareLabor HW vendorLow10% 80% Software vendor Low /medium 10% 80% Internet user (Large) Medium10%20%70% Internet user (small) Low30%40%30% ISPsHigh15% 70% Internet users incur approximately 90 percent of IPv6 transition costs. Vendors and ISPs account for the remaining costs.

itemH/W, S/W & service providers ISPsEnterprise users H/W cost of replacing interfaceHigh (H)Medium (M) Router/chasis/ firewall MM Software upgradation Cost NMSHH OSMH Applications DNS, FTP etc. ERP & other applications LHLH

itemH/W, S/W & service providers ISPsEnterprise users labors R&DML Train Networking /IT employees HHH Designing IPv6 transition strategy MHM/H Implementation transition MM/H Others Ipv6 address blockLLL Lost employee productivity MM Security intrusionsHH Inter operability issues MM/H

 The type of internet use or type of service being offered by each organization  The transition mechanism that the organization intends to implement( e.g tunneling. Dual-stack, translation, or a combination).  The organization-specific infrastructure comprised of servers, routers, firewalls, billing stems and standard and customize network etc.  The level of security required during the transition.  Timing of transition.

Application layer TCP/UDP IPv6IPv4 Network interface layer

22 Host/Router - IPv4/IPv6 Dual Stack Networks - Tunneling Gateway - IPv4/IPv6 Translation DRIVER APPLICATION TCP/UDP IPv4 IPv6 IPv4 IPv6 IPv6 Network IPv4 IPv6 Network Tunnel IPv4 Network IPv6 Network Translator Migration Options

1 RM = Rs 15 ( approx)