1 Prepared by: Les Cottrell SLAC, for SLAC Network & Telecommunications groups Presented to Kimberley Clarke March 8 th 2011 SLAC’s Networks.

Slides:



Advertisements
Similar presentations
Agenda Benefits of Campus LAN Other Benefits Survey Prerequisities
Advertisements

M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Chapter 3: Planning a Network Upgrade
Communications Room: Router/WAP, Switch, Server, Patch Panel Communications Room: Router/WAP, Switch, Server, Patch Panel Hard-wired Ethernet Ports… Site.
INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
Network/Technology Infrastructure Plan Section 5 – 6 – 7 As prepared for the TUSD Governing Board Summer 2007 John Bratcher Network Security Systems Analyst.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
ROYAL PALM NETWORK PROJECT John Healy Tom Jamieson
Terri Lahey LCLS Facility Advisory Committee 20 April 2006 LCLS Network Security Terri Lahey.
Hardware & Software Needed For LAN and WAN
A Guide to major network components
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
CISCO NETWORKING ACADEMY Chabot College ELEC Router Introduction.
Treaded Case Study Computer Networks 2002 Daire Sheriden Ronan Monaghan Mark Gilmore.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Terri Lahey EPICS Collaboration Meeting June June 2006 LCLS Network & Support Planning Terri Lahey.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Networking Components
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
IT Works 365 has proven success to cut IT Costs  8 Locations  700 Users/PC’s  11 Servers  1 Network Admin  1 Desktop Support  1 Out Source Support.
Chapter 5 Networks Communicating and Sharing Resources
1 October 20-24, 2014 Georgian Technical University PhD Zaza Tsiramua Head of computer network management center of GTU South-Caucasus Grid.
Chapter Overview Network Communications.
Networks What are they and how do they work? What is a Network?  Hardware and software data communication system  Two or more devices connected for.
Chapter 4 Computer Networks – Part 1
Common Devices Used In Computer Networks
MAEDS 45 th Annual Conference October , 2009.
Module 4: Designing Routing and Switching Requirements.
Supercomputing Communications Data NCAR Scientific Computing Division NETS 12/10/ Network Engineering & Telecommunications Section Update Jim Van.
 Lecturer : Ch. Nabeel Ahmed Superior University Grw Campus 1.
Computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources Usually, the connections.
Update on Campus Networks December 2009 Bruce Campbell Director, Network Services Information Systems and Technology.
VolNet2 Bill White Network Services. September 20, 2004OIT Fall Staff Meeting Why Volnet2? Based on the Security Assessment findings Insecure protocols.
Chapter 1 Communication Networks and Services Network Architecture and Services.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Terri Lahey Control System Cyber-Security Workshop October 14, SLAC Controls Security Overview Introduction SLAC has multiple.
Connect. Communicate. Collaborate perfSONAR MDM Service for LHC OPN Loukik Kudarimoti DANTE.
Networking in the Real World Presentation for CS520 Ed Drouillard, IT Services, University of Windsor January 23, 2004.
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Components By Cameron Baker.
Computer networks Internet, Intranet, Extranet, Lan, Wan, characteristics and differences.
Security fundamentals Topic 10 Securing the network perimeter.
Data Communication Networks
Mr C Johnston ICT Teacher G055 - Lecture 03 Local and Wide Area Networks.
The Technical Network in brief Jean-Michel Jouanigot & all IT/CS.
NETWORK DEVICES RONALD SHERGA OCTOBER 13, 2015 LTEC 4550.
Networking Components Assignment 3 Corbin Watkins.
Building Corporate Data Networks – A Case Study
Networking Computers Types of Network. Learning Objectives: By the end of this topic you should be able to: compare the characteristics of a local area.
Network Move & Upgrade 2008 Les Cottrell SLAC for SCCS core services group Presented at the OU Admin Group Meeting August 21,
© ExplorNet’s Centers for Quality Teaching and Learning 1 Select appropriate hardware for building networks. Objective Course Weight 2%
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Planning a Network Upgrade Working at a Small-to-Medium Business or.
Jefferson Lab Site Update Winter 2010 ESCC Meeting Andy Kowalski Bryan Hess February 4, 2010.
LTEC Assignment 3 Part 1 Shannon Smith /sls0571.
Security fundamentals
Chapter 1: Explore the Network
Unit Communication Hardware
Chapter 1 Introduction to Networking
Module 1: Understanding Local Area Networks
Network Security Solution
Planning and Troubleshooting Routing and Switching
2018 Real CompTIA N Exam Questions Killtest
SLAC’s Networks Prepared by: Les CottrellSLAC,
Virtual Private Network
Campus Network ~100 academic/administrative buildings
Networking Essentials
Network Hardware and Protocols
Presentation transcript:

1 Prepared by: Les Cottrell SLAC, for SLAC Network & Telecommunications groups Presented to Kimberley Clarke March 8 th 2011 SLAC’s Networks

Outline Phone upgrade Core network & offsite connections Cell phone coverage, mobility Wireless, visitor subnet Monitoring LAN & WAN Gigamon VPN upgrade IPv6, IPAM Conclusions 2

Philosophy Support getting the science done (safely) –The science is the mission Uniformity of design (where possible) –Define standardized solutions & apply repeatedly –Limit vendors, technologies used –Leverage existing OCIO staff expertise Engineered for robustness (e.g. redundancy) –OCIO is not staffed for 24/7 coverage –“Throwing smart (dedicated) people at issues” works as long as you do not throw them too often Powerful, easy to use monitoring 3

Central phone system Designed for low cost ($15/phone/month), high reliability (1 unscheduled system fail in 22 years – loss power) End of life: parts are 1988 vintage, last major update 2000 –4000 phones, ~ 50% are non user (e.g. wall, conference room, FAX, emergency …, so can stay analog) Evolutionary upgrade phone system using existing infrastructure (phone sets, closets, UPS, cabling) where possible to reduce costs and ensure maintainability while we: –Enable VoIP –Enable unified communications /vmail integration, presence, mobility, SMS … 4

Network Scale 70 major buildings, Single site, but lots of worldwide collaborations 300 layer 2 capable devices, 50 layer 3 15K end devices, 30K ports, Support: – science (open high performance worldwide), –business (protected, e.g. HR, finances..), –controls & monitoring systems (local HVAC, accelerator), –desktops with local & internet access –visitors 5

6

Local Area network Core network: highly reliable, supports 10Gbps connections for: –high performance computing clusters, offsite, and buildings (edge) switches, –Redundancy for power, routers, power supplies etc. Most wired desktops can be/are enabled for 100Mbps connections, we are upgrading to 1Gbps to the desktop for major buildings. Segmenting and rationalizing subnets –Private (RFC1918), Internet access, printers –Subnet set/switch, removing flat earth –Improved security, isolation of problems & performance 7

Wide Area Network Access Off site links: multi 10Gbps links –ESnet most production and also dedicated circuits (using MPLS) to BNL for ATLAS –Stanford and CENIC/Internet2 One physical path down Sand Hill Rd AT&T conduits with IRU –SRCF 2 nd redundant path ACLs at borders 8

Mobility WiFi: most buildings covered ~ 160WAPs Open access, not authenticated: ease of use No privileged access to SLAC resources Visitor subnet: no servers, block inbound connections 9

Cell phones Coverage outside good: on site macro sites for T-Mobile, Sprint, Metro-PCS and AT&T. Verizon going in across the street In buildings: most are penetrated from outside. –Installed BDAs in a few heavily shielded buildings –Pico cell in one area Pagers at end of life (atrophied ’60s technology) 10

Monitoring Critical enabler for network and desktop admins LAN: lookup routers, switches, ports, hosts, hosts for person, MAC & IP addresses, VLANs, provide: –History, uilization, temp, cpu, power use, weather maps, idle ports, topology WAN: collaborations worldwide, E2E pingER & perfSONAR (multi NRENs) GigaMon: capture packets outside border on 10Gbps links and inspect 11

Security Improved security via ACLs, firewalls, New VPN infrastructure going into place using IPSEC, Easy to use visitor network, reasonable security –private VLANs, –blocking of in-bound sessions and outbound SMTP –Blocking of outbound SMTP 12

Future Developing new roadmap for service types with differing security requirements: –science; business; guest/visitors; SLAC general networks (desktops etc.); internal networks such as controls, data acquisition being ready to address IPv6 when DoE demands it –Network equipment IPv6 capable better IP address management with delegation, Mobile computing and unified communications 13