1 A Method to Manage the Corporate WAN Jim Martin Assistant Professor of Computer Science Clemson University

Slides:



Advertisements
Similar presentations
High-quality Internet for higher education and research Plaats en datum …and possible roles of the NRN VoIP scenarios within NRN networks Erik Dobbelsteijn.
Advertisements

M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Computer networks Fundamentals of Information Technology Session 6.
MX25: Multifunction SIP Gateway Zultys Technologies.
Chapter 5 Networks. Learning Objectives After reading this chapter the reader should be able to: Understand the importance of networks in the field of.
A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
WAN Connectivity The VMO Wide Area Network will extend between all stores, offices, and Lyon, France We have designed a highly redundant network with.
FINAL EXAM TUE 5/16 MRST : open book/open notes - 25% of final grade - off campus students will receive exam by postal mail.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 2: Teleworker Connectivity.
Small Office Service Serial Router Connects Internal Stations to Shared Broadband Access Service Small Office Serial Router Shared Broadband Line ISP.
Lesson 3 – UNDERSTANDING NETWORKING. Network relationship types Network features OSI Networking model Network hardware components OVERVIEW.
Information Security in Real Business Asian Connection and Craig.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 1 Remote Network Connectivity Requirements.
Internet Marketing Networks. Critical Implications Ubiquity Accessibility by all Expectations What do users think equals success Sharing Efficiency through.
Lesson 14 – DESIGNING A NETWORK. Assessing Network needs Meeting Network needs OVERVIEW.
Semester 4 - Chapter 3 – WAN Design Routers within WANs are connection points of a network. Routers determine the most appropriate route or path through.
A Framework for Analyzing Strategies of Internet Service Providers (ISP) By: Erik Wierstra, Gabriele Kulenkampff, Hans Schaffers Presented by: Ron Johnson.
Computer Networks,Internet,& SMTP Priyanka Daultani Department of Computer Science USF, San Francsico, CA.
Measuring the experience consumers have when using broadband services Tim Gilfedder Technical Advisor 3 rd July 2015.
1. 2 New Computing Models, and What They Mean to the Small and Mid Sized Business Consumer How your business can make practical decisions between “The.
NETWORKING CONCEPTS. THE INTERNET When 2 or more n/w are connected they become an internetwork or an internet Eg. Assume an organization has two offices.
Network Devices BY JACKSON HARDESTY. Hubs  Hubs are a now outdated way of sending signals at layer 2 compared to switches.  Hubs are used primarily.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
 Sols Group 2002, Corporate Presentation. COMPANY PROFILE.
Gordon Kass CEO & President 919/ x26 Porivo Technologies Inc. Measuring end-to-end web performance.
C19 Phifer - 1 VPN Deployment: Case Studies Moderator: Lisa Phifer Core Competence, Inc. Session Speakers: Ralph MontfortRalph Montfort,
1 WHY NEED NETWORKING? - Access to remote information - Person-to-person communication - Cooperative work online - Resource sharing.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
By Chris Versaci CLOUD SECURITY. WHAT IS CLOUD COMPUTING? Cloud computing is a concept that involves a large number of computers connected through a real-time.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
BUSINESS DRIVEN TECHNOLOGY Chapter Sixteen: Integrating Collaborative Partnerships.
AW01 Introduction to WANs Case Study. Objective Identify the appropriate WAN technology given specific requirements.
Managing Technology and Information Chapter 15. Distinguish between data and information and explain the role of management information systems in business.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
Chapter Objectives After completing this chapter you will be able to: –Understand the basic concepts of ATM –List some reasons for implementing an ATM.
Digital Divide Draft Sept 19. Digital Divide Definition - Digital Divide.
Teaching and Learning with Technology Chapter 7 Networks and the Internet by La Tisha Jenkins.
Module 2.1 Communication and networks in modern society Theme 2: Let’s communicate!
Types of networks! Charlotte Oates. Local Area Network On a small area, e.g: within one building Connects computers and other devices such as printers.
LANs, WANs and MANs. LAN WAN LANs vs. WANs (Video) Examples WLAN MANEPN.
By : Mariam Beirouty & sara al shalian.. LAN A local area network (LAN) is a computer network that connects computers and devices in a limited geographical.
1 Connecting to a Database Server. 2 We all have accounts, with a single database each, on a Microsoft SQL Server on the USF network: allman.forest.usf.edu.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Simple, End-to-End Performance Management Application Performance.
Virtual Private Networks (VPN) By Donald Brown. What is a VPN? A network that uses the internet, to provide remote offices or individual users with a.
TOP 5 Reasons to Migrate IPSec VPN to SSL VPN. 1)Reduce remote access costs by eliminating client software installation, configuration, and maintenance;
Cisco Discovery 3 Chapter 1 Networking in the Enterprise JEOPARDY.
Chapter 8 Technology and Information Management 1 Chapter 8 Technology and Information Management ©2008 Thomson/South-Western.
Nexbase Invites You To Our Special Products
Chapter 1 Introduction to Networking
Virtual Private Networks
Semester 4 - Chapter 3 – WAN Design
Video Conferencing Video conferencing is a form of communication where users with computers and web cams communicate using both audio and video over the.
VPN (Virtual Private Network)
9/20/2018 8:02 PM Meet up with the Office 365 networking team and share your onboarding experiences Jeff Mealiffe, Paul Andrew, Paul Collinge, Sameer Sitaram.
Chapter 1 Data Communications and NM Overview 1-1 Chapter 1
Virtual Private Network
VPN What, where, who, why when?.
Networking and Security
Networks Your Name Roll No To be continued.... 1/12/2019 Your Name.
Chapter 8 Technology and Information Management
Cloud Computing LegalRun Solutions Why It’s Right for You!
Microsoft Virtual Academy
Presentation transcript:

1 A Method to Manage the Corporate WAN Jim Martin Assistant Professor of Computer Science Clemson University

2 For a residential Internet access service, what is service quality? Service quality means that the service being delivered is meeting requirements. Your Home Computer Internet Access Network ISP’s Network

3 How would you assess service quality? –First, define appropriate performance metrics: What is a metric? –A quantity that is related to performance and reliability of a network. Examples: –Availability: Based on connection failures or service outages. –network performance: loss and latency to meet certain bounds. –Second, define what good performance is based on the metrics In other words, identify an assessment decision

4 Your Home Computer Internet Access Network Where can performance problems occur? The destination? The Internet ? The access network ? ISP’s Network The ISP ? Performance problems can exist anywhere….

5 Your Home Computer Internet Access Network What service quality can a residential user expect? End-to-end performance ??? ISP’s Network In this environment, there’s no point to offering an Internet access service with performance guarantees.

6 How about a corporate network? A market exists for end-to-end performance guarantees! What’s the difference from the residential scenario? No INTERNET!! Companies are willing to pay more for a more predictable service! Employees ISP Access Network Corporate Network (branch office) Corporate Network Private Network Interconnection done via a VPN service.

7 Why should an organization manage their WAN? Employees ISP Access Network Corporate Network (branch office) Corporate Network Two reasons: 1.To validate service provider supplied SLAs. 2.More importantly to determine if the WAN service is negatively impacting employee productivity. Employees require data and services located at the main corporate network

8 How should an organization manage their WAN? Employees ISP Access Network Corporate Network (branch office) Corporate Network Traditional approach to validate service levels and provisioning decisions based on ping-based metrics: Problem: it’s hard to correlate the metrics with end user’s quality of experience. Much easier with application level metrics. Ping-based active probe process at the service endpoints

9 What are the research issues? Develop ‘user oriented’ performance metrics and assessments. Develop an ‘organization oriented’ assessment decision. Employees ISP Access Network Corporate Network (branch office) Corporate Network Use application and service specific metrics to drive a policy based assessment decision. Monitor application (web, streaming, telephony) and service specific metrics at the service endpoints