UDL Network Operation kotaro

Slides:



Advertisements
Similar presentations
New Directions in Enterprise Network Management Aditya Akella University of Wisconsin, Madison MSR Networking Summit June 2006.
Advertisements

Feb 22nd 2002 Infrastructure requirements for distance education Keiko Okawa WIDE Project.
Temasek Engineering School S atellite-Internet Competency Unit Presented by KK Kwong on behalf of John Leong Satellite-Internet WG APAN Technology Area.
IPv6 deployment in AI3 network Suguru Yamaguchi WIDE Project.
I2 GigaPoP Operators Workshop Kazunori Konishi
IPv6 Operation and Plan sirokuma. Presentate … 1.Why we use sTLA (new Address Space)? 2.Status 3.Tommrow Agenda 4.Contributing Promotion of IPv6 in Asia.
Session2 Discussion for Future Planning (Course/Events) AI3 Tokyo Meeting June 20, 2003.
1 Network Monitoring with Nagios Asian Internet Interconnection Initiatives Project Yan Adikusuma Nara Institute of Science and Technology
SFC site update AI spring meeting, Tokyo Miyoko Kumaki.
SOI Mirror SERVER Maki Tsuchiya
Evaluation of the UDLR environment Takeshi Usui
Brief Update from Operation-TF. UDBox Status Total 12 Boxes –6 Shipped to Partner ITB/AIT/ASTI/USC/USM/AIMST AIT has trouble on the BOX –1 Operational.
COUNTRY REPORT AI3-VN TOKYO 6/2003 AI3-Vietnam Tran Ba Thai, IOIT, Vietnam.
Thailand Update Olivier Nicole, AIT AI 3 meeting June 20 th, 2003.
SAKURAFUBUKI 3rd AI3 Workshop June 19, 2003 Maki Tsuchiya Keio University, Shonan Fujisawa Campus.
UDL On-link Scalability Kotaro Kataoka Keio University.
Hasanuddin University Hasanuddin University State University State University Located in Makassar, South-Sulawesi, Indonesia.
Operation TF Kotaro/Abas. Discussion Two-UDL 13Mbps Detailed Schedule ASTI Routing (APAN-AI3) UNSYIAH Network Update –Current network situation Diagram.
Asian Youth Fellowship HELP Institute AI3 meeting, Tokyo June 2003 Asian Youth Fellowship HELP Institute Shaun Lim HELP Institute A YF Asian Youth Fellowship.
AI3 and SOI-ASIA Administrative discussion Jun Murai.
Operation BOF husni tokyo, 2003/06/21. Agenda Usage of UDL(15minutes) Redundancy of satellite routers(10minutes) IPv4 Address assignment policy(15minutes)
Topics from Last Meeting. Topics and Brief Status UDbox Troubles –Almost solved –To be covered in Operation TF UDstation Installation –Done, but have.
Operation TF. –Operator TF – Agenda UDL Operation UDL 13Mbps bandwidth extension IPv4 Routing on UDL Other Routing Issues New network design in SFC Security.
Directors Meeting. –Directors Meeting –Bandwidth for UDL mesh –IPv6 request from Nepal –Re-organizations –Future directions –
SOI Asia Site Update Yoo 19 April 2006 SOI Asia/AI3 meeting.
SOI-ASIA Unofficial Operators Meeting 2 June 2004.
Noriatsu kudo AI3 meeting(Work Shop) Noriatsu kudo
1 PIM-SM over UDLR 54 th IETF, 2002/07/16.
1998/10/08 KEIO University, JAPAN Mikiyo
Newcomer Session Day1-2 UNIX operation system administration Lecturer PC Lecturer PC2 Student PC Student PC Student PC Student PC Student PC Student PC.
Modem Watch Dog for SONY Satellite Receiver Kotaro Kataoka
AI3 Malaysia (USM) Activity Report Jun 2003 By Wan Tat Chee.
Newcomer Session Day1~3 (1): UNIX operation system administration Lecturer PC Lecturer PC2 Student PC Student PC Student PC Student PC Student PC Student.
Internet Connectivity Stable 128 kbps connectivity to local ISP dedicated to this project.
AIT site update Olivier Nicole Operation update Switch frequency between ITB and AIT as suggested in last meeting Switch frequency between.
ITB Site Update Affan Basalamah Huahin, April 2006.
Summary of TF. Topics New UDLR receiver box and ULE Activities and Connectivities with other RENs Dokodemo SOI Asia Satellite resource allocation Jaxa.
Firewalls, Networking and Monitoring Rolly Gilmour Object: to discuss issues relating to the Operation of the Grid and Grid middleware in a campus network.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
COEN 252: Computer Forensics Router Investigation.
1 Chapter Overview Creating Sites and Subnets Configuring Intersite Replication Troubleshooting Active Directory Replication.
Using Microsoft Network Access Protection to test Dr.Web anti-virus software The workstations successfully checked by NAP can be used in a corporate network.
Grid Data Management A network of computers forming prototype grids currently operate across Britain and the rest of the world, working on the data challenges.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Asian Internet Interconnection Initiatives AI 3 status and plan - Resource Allocation Committee & NOC Meeting - APAN 2003 Conference in Fukuoka January.
What’s New in Fireware v11.9.5
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
Basic Network Gear Created by Alex Schatz. Hub A hub is a very basic internetworking device. Hubs connect multiple machines together and allow them to.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 05 Network Protocols.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Module 8: Managing Terminal Services. Overview Use and manage Terminal Services RemoteApp programs Use and manage Terminal Services Gateway Optimize and.
© 2004 AARNet Pty Ltd Measurement in aarnet3 4 July 2004.
Module 9: Implementing Caching. Overview Caching Overview Configuring General Cache Properties Configuring Cache Rules Configuring Content Download Jobs.
Internet (THEnet ISP Gateway) Home PC Home Laptop Wireless AP/RouterVPN Concentrator Firewall Hub (running WireShark for Monitoring) Work Server Work PCs.
Campus Safety Update September Area’s of Focus – Fall 2008 Implementation of Multi-Modal Personal Mass Notification Recruitment of Emergency & Security.
3.3 Data Networks. Overview Identify the main differences between LAN and WAN. Identify the advantages of using a network over stand-alone computers.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
NETGEAR CONFIDENTIAL FVS338 ProSafe VPN Firewall 50.
Objectives how to use a systematic, top-down process when designing computer networks focuses on the first step in top-down network design: analyzing your.
Chapter 7 – Confidentiality Using Symmetric Encryption.
SOI Asia Realtime class Shoko Mikawa (funya) SOI Asia E-Global Operators Workshop 2006 Summer August 22 nd – 26 th, 2006.
 SITI NUR SOLEHA BT ADAM  SYAFIQAH YUSRA BT MOHAMAD  HUMAIRA BT KHAIRUDDIN  INTAN NORAZLINA BT HAIRUDDIN 
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
ICT II Unit 6 Networking.
Potential Areas of Research Activity – March 2000
ETHANE: TAKING CONTROL OF THE ENTERPRISE
Presentation transcript:

UDL Network Operation kotaro

Presentation Overview Current situation of C-band UDL network Basic network composition Policy for using UDL (re-visited) Keep machines running Security Issues Monitoring Issues Challenges Milestone

Current Situation Connection –Full time –Part time Network Vulnerability –Security Issues

Basic Network Composition SONY-BOX Receiver- Router Gateway- Router SOI- Server Campus LAN / INTERET Campus LAN / INTERET Terrestrial Link / Satellite Link C-band UDL Network

Commodity Traffic (1) Question –Can commodity traffic for SOI-ASIA partners flow into the C-band UDL?? Requirement –Highest priority for SOI-ASIA lectures

Policy for using UDL (re-visited) We will learn requirements and problems, and more from monitoring traffic Improvement will be made based on experience UDL PrefixP2 Policy RoutingP1 AI3 Partner SAKURAFUBUKIS3 CommodityS2 LectureS1 SOI-ASIA Partner UDL Prefix Policy Routing Commodity SAKURAFUBUKI SOI-ASIA Lecture priority

Commodity Traffic (2) HTTP traffic using proxy (SOI-Server) can flow into the UDL And any traffic regarding SOI-ASIA Project sometimes other traffics prioritized rather than your commodity traffic

Keep machines running Important services should not be shut down –Domestic (local) Services –Keep monitoring something To make routers and servers running –Physical machine protection from surge, heat –Uplink availability But you may have downlink every time

Security Issues Application Vulnerability –Too old OpenSSH, SSL –NetSNMP (UCD-SNMP) Other services? –Does any service you use have its vulnerability? Check and Update

Monitoring Is pull method best for us in C-band UDL Network? –Can RO sites respond every time? Redesign of MWD in UDL Network –In the scope of my master thesis…

Challenges OSPF –Store the tips and try Multicast –While the SOI-ASIA lectures are not scheduled, we can try pimd IPv6 –IPv6 capable SONY-FEED will be installed in SFC