ECEN5553 Telecom Systems Dr. George Scheets Week 6 Readings: [11a] "Cybercrime: Dissecting the State of Underground Enterprise" [11b] "A Call to Cyber.

Slides:



Advertisements
Similar presentations
IT’S HERE Bandwidth Technologies. Agenda Technologies for Bandwidth –Single Location DSL/Cable T1/Bonded T1 DS3/OC-N Ethernet Over Copper (EoC, EoFM)
Advertisements

Broadband and Wide Area Network Services Carrier Gigabit Ethernet Multi Protocol Label Switching Vs. IP VPNs T-1 & T-3 SIP Trunks Security Network Topology.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Underlying Technology.
QoS Solutions Confidential 2010 NetQuality Analyzer and QPerf.
Internet Connections By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
IST 201 Chapter 5. LAN Technologies Ethernet – most widely used technology in LANS In 1970, developed and implemented by: Digital Intel Xerox IEEE
N Read 2.3, 2.5 n Problems 1.6, 2.6, 2.8 n Quiz #1, Lecture 12, 4 February u Open book & notes u Calculators are allowed u No Smart Phones ECEN4533 Data.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 1, Tuesday 1/9/2007)
Internet: A Network of Networks. Spring 2002Computer Networks Applications Disparate Network Technologies Different goals: Speed, cost, distance; Different.
ECEN5553 Telecom Systems Dr. George Scheets Week #8 Readings: [16] "Voice over the Internet: A Tutorial" [17a] "Rapidly Recovering from Catastrophic Loss…
TDC 461: Wide Area Network Services DePaul University 22 May, 2001.
TCP/IP Protocol Suite 1 Chapter 3 Objectives Upon completion you will be able to: Underlying Technology Understand the different versions of wired Ethernet.
Introduction to Computer Networking. Wireless Network.
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
Chapter 2 Review of Computer Network Technology
CISCO NETWORKING ACADEMY Chabot College ELEC Router Introduction.
333: DISCUSS THE FUNDAMENTALS OF NETWORKING.  1. Discuss networking concepts (20 hrs)  2. Discuss hardware & software requirement to setup a Local Area.
Toolbox Helping You Define Value and Close Business The Business Value of Ethernet Services.
Lawrence G. Roberts CEO Anagran September 2005 Advances Toward Economic and Efficient Terabit LANs and WANs.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
Networking Components Christopher Biles LTEC Assignment 3.
LTEC 4560 Summer 2012 Justin Kappel Networking Components.
Chapter 7 WANs and Remote Connectivity. WAN Essentials A WAN traverses a large geographic area A WAN link is a connection from one site to another and.
N Read: 2.4 n Problems: 2.1, 2.3, Web 4.2 n Design #1 due 8 February (Async DL) u Late = -1 per working day n Quiz #1 u < 11 February (Async Distance Learning)
Outlines Received due 13 March 24 %. Homework n Review for Midterm on 1 March 2000 n Research Paper n Readings [11] “ATM Systems: What’s Next?” [12] “Long.
Outlines Received due 13 March %. Homework n Review for Midterm (1 March 2000) n Research Paper n Readings [5] “Virtual Private Networks” [6] “Internet.
Chapter 7 Connecting to the Internet. Connecting to the Internet FAQs: – What is the Internet? – What are the options for Internet service? – What is.
NETWORKS.
ECEN5553 Telecom Systems Week #3 Read [4a] "High Speed Ethernet: A Planning Guide" [4b] "What If Ethernet Failed?" [4c] "8 Ethernet Predictions for 2014"
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
ECEN4533 Data Communications Lecture #2125 February 2013 Dr. George Scheets n Read 11.4 n Problems: Chapter 11.2, 4, & 5 n Quiz #2, 25 March (Live) < 1.
Outlines Received due 13 March %. Homework n Review for Midterm (1 March 2000) n Research Paper n Readings [9] “MPLS: Special Delivery” [10] “Diversifying.
ECEN5553 Telecom Systems Dr. George ScheetsWeek #5 Read [9a] "The Cognitive Net is Coming" [8b] "How Can the Internet Have Too Many Routes and Not Enough.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Ch 1. Computer Networks and the Internet Myungchul Kim
CS 453 Computer Networks Lecture 18 Introduction to Layer 3 Network Layer.
Outlines Received due 13 March 30 %. NO CLASS Week of March (Spring Break)
Chapter 7 Connecting to the Internet. 2Practical PC 5 th Edition Chapter 7 Getting Started In this Chapter, you will learn: − What is the Internet − Options.
Routers Operate in a Mesh –Many possible alternative routes between two stations Only One of Many Possible Alternative Routes Packet.
ECEN5553 Telecom Systems Dr. George Scheets Week 6 Readings: [12a] "The Real Story of Stuxnet" [12b] "Everything You Know About Cyberwar is Wrong" [12c]
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Essentials of Telecommunications.
Mr. Mark Welton.  WAN transportation method that formats data into frames and sent over a network controlled by a service provider  Frame Relay is often.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
Higher Computing Networking. Networking – Local Area Networks.
Chapter 1: Explore the Network
ECEN5553 Telecom Systems Dr. George Scheets Week #8 Readings: [18a] "Trading at the Speed of Light" [18b] "Is The U.S. Stock Market Rigged?" Optional:
Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.
Router Basics MM Clements.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
11 ROUTING IP Chapter 3. Chapter 3: ROUTING IP2 CHAPTER INTRODUCTION  Understand the function of a router.  Understand the structure of a routing table.
Lecture 1: Introduction to WAN
ECEN5553 Telecom Systems Dr. George Scheets Week #7 Read [14a] "IPv6: A Catalyst and Evasion Tool for Botnets" [14b] "Segmenting for security" [15a] "All.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
By: Chasity, Jamon, Clifton.  Computer networks have lots of pathways that send information back and forth.  Networks can even send the information.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
1587: COMMUNICATION SYSTEMS 1 Wide Area Networks Dr. George Loukas University of Greenwich,
Lab #2 NET332 By Asma AlOsaimi.
ECEN5553 Telecom Systems Dr
ECEN5553 Telecom Systems Week #4 Readings: Read [5a] "Whatever Happened to the IPv4 Address Crisis? thru [5c] "How Can the Internet Have.
NET 3710 WAN Data Networks.
ECEN5553 Telecom Systems Dr
Wide Area Network.
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Lecture 1: Introduction to WAN
Connectivity methods. Connectivity methods Exam Answer WAN/LAN  Each office will have its own Local Area Network or LAN.  But the company also wants.
Wide Area Network Fundamentals
Private Networks.
Principles of Information Technology
Chapter 8 – Data switching and routing
Presentation transcript:

ECEN5553 Telecom Systems Dr. George Scheets Week 6 Readings: [11a] "Cybercrime: Dissecting the State of Underground Enterprise" [11b] "A Call to Cyber Arms" [12a] "The Compleat Story of Phish" [12b] "Diplomatic and government agencies targeted in years-long cyberespionage operation" [12c] "DDoS Attack Doesn't Spell Internet Doom" Exam #1 Lecture 16, 24 September (Live) No later than 1 October (Remote DL) Outline 8 October 2014, Lecture 22 (Live) No later than 15 October (Remote DL)

Outlines Received due 8 October (local) 15 October (remote) 35 %

The Internet Is... a Security Nightmare The Internet Is... a Security Nightmare   Bad things have been out there for years   Viruses, Worms, Trojans, Denial of Service, etc.   November 2, 1988 Internet Worm   Network shut down for 2-3 days   Took advantage of   Unix buffer overflow problems   Poor password choices  Stuxnet Worm  State sponsored?  Seemed to target Iran's nuclear bomb program

The Internet Is... a Security Nightmare n TCOM5223 Information Assurance Management n TCOM5233 Applied Information Systems Security n TCOM5243 Information Technology Forensics n “Remember, when you connect with another computer, you're connecting to every computer that computer has connected to.” u Dennis Miller, Saturday Night Live

Pros of Using the Internet n n Any-to-Any Connectivity n n It’s Inexpensive (save $$$$) n n Tons of valuable information available n n Excellent marketing/sales tool

Cons of Using the Commodity Internet n n Any-to-Any Connectivity puts all attached machines at risk n n Slightly higher risk of Theft of Traffic n n Tons of Worthless Information Available n n No QoS guarantees or Guaranteed Bandwidth May have trouble rapidly moving large files May have trouble reliably moving time sensitive traffic WARNING: SECURITY HAZARD!

802.3 Ethernet Packet Format MAC Destination Address MAC Source Address CRC Data + Padding Bytes: IPv6TCP

Connectionless vs. Connection Oriented n n Connectionless * Packet delivery may be out of order * Packet delivery NOT guaranteed * Packets may be mangled * End User’s responsibility to fix any problems n n Connection Oriented * Packet delivery in order * Packet delivery usually guaranteed

IP is Connectionless Data + Padding up to 1,460 IPTCP I/O decisions based on IP address & look-up table. Tables updated independent of traffic.

Wide Area Connectivity Options n n Leased Line (a.k.a. Private Line) Network u u Switches are byte aware u u Circuit is assigned trunk BW via TDM F F BW required is based on peak input rates u u Route through system determined in advance. u u Pricing function of distance & peak rate u u Most expensive connectivity option u u Highest quality connectivity option

Leased Line Usage n Revenues still around $34 Billion in 2009 u Drop in Corporate u Increase in wireless backhaul n Figure Source: Insight Research October 2004 Network World Article

Switched Ethernet LAN's 100, 1,000 Mbps 10/100 Mbps Edge Router PC Switched Hub Switched Hub Switched Hub Leased Lines

Telecom Carriers dedicate 320, 128, and 256 Kbps links for our sole use via Circuit Switching. OKC Detroit NYC Carrier Leased Line Network Router Leased Line Ex) Corporate Leased Line Connectivity

OKC Detroit NYC Carrier Leased Line Network Router 384 Kbps From/ToOKCDETNYC OKC DET88-28 NYC Kbps Ex) Corporate Leased Line Connectivity

How will company connect to Internet? n Configuration u Every site connect locally? u All sites connect thru, say, OKC? n Type of connection u Leased Line u DSL? u Cable Modem? u Other?

OKC Detroit NYC Carrier Leased Line Network Router 384 Kbps ISP 320 Kbps Ex) Internet thru OKC From/ToOKCDETNYCISP OKC DET NYC ISP How big should the pipe to the ISP be? 300 Kbps is outbound from ISP > 640 Kbps circuit needed. 640 Kbps

OKC Detroit NYC Carrier Leased Line Network Router 576 Kbps ISP 448 Kbps Ex) Internet thru OKC From/ToOKCDETNYCISP OKC DET NYC ISP Need to bump size of other 2 pipes. 194/186 NYC → 448 Kbps 278/166 DET → 576 Kbps 640 Kbps

WAN Design (Link Reduction) n Start with Traffic Matrix n Examine Full Mesh n Consider eliminating lightly used links u Reroute affected traffic n Compare costs at each iteration

WAN Connectivity Options n Internet u Routers are packet aware u Datagrams are assigned trunk BW via StatMux F BW required based more so on average input rates u Each packet individually routed F MPLS enabled networks can use Virtual Circuits u Pricing a function of connection size F & Possibly QoS if MPLS and/or DiffServe used

Ex) Commodity Internet Corporate Connectivity Local Carriers dedicate bandwidth to our use. ISP provides random Packet Switched StatMux connectivity via datagrams. OKC Detroit NYC ISP Network Router

Ex) Commodity Internet Corporate & Internet Connectivity OKC Detroit NYC ISP Network Router 640 Kbps 576 Kbps 448 Kbps From/ToOKCDETNYCISP OKC DET NYC ISP /280 OKC → 640 Kbps 194/186 NYC → 448 Kbps 278/166 DET → 576 Kbps

Ex) IP with QoS Corporate & Commodity Internet Connectivity OKC Detroit NYC Internet Service Provider Network MPLS VC, OKC - Detroit MPLS VC, NYC - OKC 768 Kbps Detroit & NYC: No change. OKC: Port Speed must be bumped to relay Detroit ↔ NYC corporate traffic. From/ToOKCDETNYCISP OKC DET NYC ISP Kbps 448 Kbps

Leased Line at OKC ↔ ISP n Outbound u OKC→Det 144 u OKC→NYC 76 u OKC→ISP 60 u Det →NYC 28 u NYC → Det 34 From/ToOKCDETNYCISP OKC DET NYC ISP n Inbound u Det→OKC 88 u Det→NYC 28 u NYC→OKC 112 u NYC→Det 34 u ISP → OKC 110 Total Outbound = 342 Kbps Total Inbound = 372 Kbps Leased Line Size > 744 Kbps Leased Line = 768 Kbps minimum.

Carrier Leased Line Network Carrier reserves BW from pool for our use. Ex) For a 384 Kbps connection, Cross-Connects assign 6 byte sized TDM time slots 8000 times/second = 6*8*8000 = 384 Kbps. Cross-Connect Trunks Leased Line Byte Aware

Internet Service Provider Backbone Router Trunks Leased Line ISP Routers assign BW for our use on Random, as needed basis via StatMux & Packet Switching. Packet Aware

LAN Internet Service Provider Network Corporate customers might attach via Edge Router & Leased Lines. Router Trunks Leased Line PC WS

Internet (Inside the Cloud) n Example Internet Router 100 Mbps Trunk ?? 1.54 Mbps Connections P(Access Line is Active) = 10% How many access lines can this switch support?