DSL Access Architectures and Protocols. xDSL Architecture.

Slides:



Advertisements
Similar presentations
Next-Generation Subscriber Access Methods Presenter: Donnovan Wint Technical Marketing Manager Lucent Technologies.
Advertisements

Encrypting Wireless Data with VPN Techniques
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
A Community-Driven Approach to Wireless Internet Service.
PPPoE Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Labcourse “Routerlab”
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Bay DVPN Dial-in Virtual Private Networking Using Layer 3 Tunneling Gary Malkin Bay Networks Internet Telecom Business Group.
IPv6 over xDSL: The DIODOS Proposal Athanassios Liakopoulos Greek Research & Technology Network International IPv6 Workshop, Kopaonik,
Multimedia over DSL By Phil Moy. May 14, Agenda n DSL Forum Working Text 80 - Multiservice Architecture & Framework Requirements n DSL Forum Working.
Module 5: Configuring Access for Remote Clients and Networks.
IPv6 Address Provisioning In IPv6 world there are three provisioning aspects wich are independent of whether the IPv6 node is a Host or CE router: IPv6.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 2: Teleworker Connectivity.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Hands-On Microsoft Windows Server Connecting Through Terminal Services Terminal server – Enables clients to run services and software applications.
Remote Networking Architectures
Copyright Kenneth M. Chipps Ph.D. 1 VPN Last Update
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Network
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
NetComm Wireless VPN Functionality Feature Spotlight.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Windows Server 2008 Chapter 9 Last Update
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
6W 02/ IPv6 over DSL - Deployment Scenarios - Franck Leclercq, 6WIND VP sales Asia-Pacific.
Chapter 20: Getting from the Office to the Road: VPNs BAI617.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Point to Point Protocol
Access Protocols PPP vs. DHCP Chapter 5. Overview PPP DHCP User identities Assignment of IP addresses Assignment of other parameters.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Framework & Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks ANCP WG IETF 71 – Philadelphia draft-ietf-ancp-framework-05.txt.
John Kearney c:\ amydocs\sales support\products\ ILUG AGM 22/6/02 eircom i-stream ADSL Karl Jeacle IP Network Services.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
MTM’99 Workshop Heidelberg, 25 February 1999 Fixed-Mobile Convergence across Telecom and IT Networks Geoff Richman P809 Task 2.5.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
輔大資工所 在職研一 報告人:林煥銘 學號: Public Access Mobility LAN: Extending The Wireless Internet into The LAN Environment Jun Li, Stephen B. Weinstein, Junbiao.
L2TP Chapter 7. Motivation Sometimes we want to tunnel one protocol over another protocol –Maybe the network does not understand how to forward that protocol.
Architecting the Network Part 2 Geoff Huston Chief Scientist, Internet Telstra ISOC Workshop.
Revised January 25, 2000 Diagram Icons. 2 ICON LIBRARY Diagram Icons – CoSine IPSX Unit and CoSine Software Icons CoSine Equipment CoSine IPSX.
Mar 27, 2000IETF 47 - Pyda Srisuresh1 Secure Remote Access with L2TP Pyda Srisuresh.
IETF66 PANA WG Problem Statement for a time-basis accounting in an "always-on“ Broadband scenario R. Maglione - Telecom Italia
V6OPS WG IETF-72 IPv6 in Broadband Networks draft-kaippallimalil-v6ops-ipv6-bbnet Presented by: David Miles Kaippallimalil John Frank Xia July 2008.
PANA in DSL networks draft-morand-pana-panaoverdsl-00.txt Lionel Morand Roberta Maglione John Kaippallimalil Alper Yegin IETF-67, San Diego.
Jonathan Brewer Technical Director Araneo Wireless Solutions Layer 3 Tunnels for Broadband Delivery.
WholeSale Model 10. WholeSale Model This feature enables the Nomadix device to act as an L2TP Access Concentrator (LAC) and initiate single or multiple.
Virtual Private Network (VPN)
Virtual Private Networks
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Broadband Components Customer Premises Equipment(CPE)
Virtual Private Network (VPN)
Server-to-Client Remote Access and DirectAccess
PPPoE Internet Point to Point Protocol over Ethernet
AAA: A Survey and a Policy- Based Architecture and Framework
Presentation transcript:

DSL Access Architectures and Protocols

xDSL Architecture

Broadband Remote Access Server The Broadband Remote Access Server (B-RAS) is a key component of DSL broadband access networks that serves as an aggregation point for subscriber traffic (IP, PPP and ATM) and provides session termination (PPPoX, RFC 1483) and subscriber management functions such as authentication, authorization, accounting (AAA), and IP address assignment. For the aggregation Internet traffic, the BRAS serves as a L2TP Access Concentrator (LAC) tunneling multiple subscriber PPP sessions directly to an NSP. It also performs aggregation for terminated PPP sessions or routed IP session by placing them into IP VPNs or 802.1Q VLANs. The BRAS also supports ATM termination and aggregation functions. Beyond aggregation, the BRAS is also the injection point for providing policy management and IP QoS in the Regional and Access Networks.

RFC 1483 Bridging Protocol Stack

Routed Bridge Encapsulation Protocol Stack

PPPoA

PPPOE

Comparison PPP based broadband service End user authentication to the network, forces the end user to authenticate to a radius server before being allowed access to the network Billing options, gives the provider the ability to offer different billing options, by time, by data, unlimited or by services purchased IP address conservation, a provider can limit the number of IPs a specific user can receive or can force a user off the connection at will Scalable, all authentication, authorization, and accounting can be handled for every user using existing Radius server Invisible to end user, both can be integrated in the Customer Premise Equipment CPE making the connection process invisible to the end user – though we do recommend they stay off the CPE but it is easily done and PPPoA is traditionally only on the CPE Service Selection, both can be used to offer multiple services and service selection Negatives of PPPoA Only a single session per CPE can be established. In PPPoE we offer the ability to log in to multiple services or create multiple sessions all at the same time over the same line CPE setup and access, in general PPPoA must be configured on the CPE itself. Either the CPE must support PPPoE or an ATM network interface must be installed in the PC.ATM network interface cards are expensive and both can be difficult for an end user to configure. Once an end user has the ability to configure the CPE it opens up the problem for incorrect configurations making trouble shooting by the provider very difficult resulting in increased support costs What if the CPE was pre configured by the provider? This leads to increased fulfillment costs. The provider would then have to configure each CPE separately to enter the customer’s userid and password and loses the ability to batch process the CPE Positives only found in PPPoE PPPoE offer the ability to log in to multiple services or create multiple sessions all at the same time over the same line. What do we mean by multiple services? How about a special account for a child that gives them G rated access only? How about a dedicated movie or music server?