Muhammed Rudman 14-09-2011.

Slides:



Advertisements
Similar presentations
1 Technical Area highlights and priorities APNIC Member Meeting 29 February 2008 APNIC 25, Taipei George Michaelson.
Advertisements

Cloud computing is used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication.
Integration of PAP site 17 th July 10. Requirements of PAP SITE  Bandwidth drop  Router  RJ45 cables  Switch  Gateway  Nodes  Ups  9urack.
A Technical Overview of the.ng Registry Ope Odusan Chief Operating Officer Nigerian Internet Registration Association
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Cold Fusion High Availability “Taking It To The Next Level” Presenter: Jason Baker, Digital North Date:
Local Area Networks Outline –Basic Components of a LAN –Network Architectures –Topologies and LAN Technologies –Selecting a LAN –Improving LAN Performance.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
1-1 Introduction to Computer Networks and Data Communications.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
M2M Gateway Features Jari Lahti, CTO
Campus Networking Best Practices Session 2: Layer 3 Dale Smith University of Oregon & NSRC
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Mr. Mark Welton.  Three-tiered Architecture  Collapsed core – no distribution  Collapsed core – no distribution or access.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Achieving Qualities 1 Võ Đình Hiếu. Contents Architecture tactics Availability tactics Security tactics Modifiability tactics 2.
The Operator Neutral Access At KistaIP. KistaIP ? Is a student dorm with 144 apartments.
NMS LAB2 EXPENSES  Software  Hardware and OS for software  Training  Extra usage of work time (active use of SNMP - software etc.)  New SNMP enabled.
IDK0040 Võrgurakendused I Building a site: Implementation Deniss Kumlander.
Overview Who is AusRegistry? Why use the existing infrastructure? What this means for you? Questions raised and Important points.
.ng CCTLD Opportunities for Computer Professionals Ope Odusan Chief Operating Officer Nigerian Internet Registration Association
.ng Domain Name - the Future of IPv6 in Nigeria Ope Odusan Chief Operating Officer Nigerian Internet Registration Association
Chapter 1 Introduction to Computer Networks and Data Communications Data Communications and Computer Networks: A Business User’s Approach.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
1 Version 3.0 Module 11 TCP Application and Transport.
Module 4: Planning, Optimizing, and Troubleshooting DHCP
How computer’s are linked together.
Network equipment used in a modern office
TWNIC mDNS Business Plan Kenny Huang TWNIC JET Meeting, Beijing 28 August 2000.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
CHAPTER 7 CLUSTERING SERVERS. CLUSTERING TYPES There are 2 types of clustering ; Server clusters Network Load Balancing (NLB) The difference between the.
Network Programming Chapter 1 Networking Concepts and Protocols.
Registry Functions Essential components for operating a ccTLD registry.
Network and Computer Security in the Fermilab Accelerator Control System Timothy E. Zingelman Control System Cyber-Security Workshop (CS)2/HEP Knoxville,
Business Continuity Planning for OPEN OPEN Development Conference September 18, 2008 Ravi Rajaram IT Development Manager.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
WINS Monthly Meeting 06/05/2003 WINS Monthly Meeting 06/05/2003.
System Optimization Networking
Remote Access Using a Netgear DG834 Router 1http://
Copyright 2013 FairPoint Communications Network safety and security – Protecting your communications resources Karen Romano, Vice President, Government.
 SITI NUR SOLEHA BT ADAM  SYAFIQAH YUSRA BT MOHAMAD  HUMAIRA BT KHAIRUDDIN  INTAN NORAZLINA BT HAIRUDDIN 
DotNG-A Reliable Platform for Digital Content Distribution in Nigeria Ope Odusan Chief Operating Officer Nigerian Internet Registration Association
Open source IP Address Management Software Review
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
Server Administration, Server Management and Networking Alokes Chattopadhyay.
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
SIMPLE & MODULAR PC BASED DOOR ACCESS CONTROL v1.00
Target Network ISP Internal Network
CompTIA Security+ Study Guide (SY0-401)
Network Security Solution
Virtual Private Networks
Services DFS, DHCP, and WINS are cluster-aware.
Backdoor Attacks.
Optimising Our Network
DIRECTOR OF CLOUD SERVICES
Data Networking Fundamentals
Information Technology Unit State Treasury Agency Ministry of Finance Azerbaijan Republic Elnur Aliev Baku April 11, 2018.
CompTIA Security+ Study Guide (SY0-401)
ISMS Information Security Management System
IS4680 Security Auditing for Compliance
Networking Essentials
Lecture 3: Secure Network Architecture
Designing IIS Security (IIS – Internet Information Service)
Instructor Materials Chapter 8: Applied Networking
AT&T Firewall Battlecard
Global One Communications
Presentation transcript:

Muhammed Rudman

The.ng Registry Design  3R Registry Model  Public WHOIS server on port 43  Public WHOIS web interface  EPP interface for the registrars  Escrow backup with Cocca  Stealth Primary Server  SSH with user & IP restrictions

The.ng ccTLD network Architecture  The registry  CentOS 5.2  Cocca registry software (web & EPP)  PostgreSQL Data Base software  Bind DNS software  Primary Stealth DNS  Nsa.nic.net.ng  Open BSD  Bind DNS Software  NMS  Tembria Server Monitor  Paessler PRTG  Kayoka helpdesk  Warm standby Router & Switch

New Power Design New Power Design  Motorized Automatic Voltage Regulators (AVR) for each power source  Double Power source  Dual Automatic Transfer Switch (ATS)  Multiple Power packs in each equipment  Remote monitoring of power, with ability shutdown devices remotely

The New Network Design- Under review The New Network Design- Under review  Redundant Site  Fiber and Radio linking the two sites using VPN channel  Multiple ISPs with diversity in uplink transit provider  Multiple replication of registry Database with all nodes available  Onsite and offsite backup system  Multiple firewalls (stateful & stateless ) with Intrusion Detection System  Dual authentication to all registrars into the registry: login details with either IP restrictions or Token

Network Monitoring NIRA

Secondary Name Servers  ns1.nic.net.ng I Internet Computer Bureau  ns2.nic.net.ng WoodyNet (PCH)  ns3.nic.net.ng Dynamic Network Services  ns4.nic.net.ng Dynamic Network Services  nsa.nic.net.ng Nigeria  nsb.nic.net.ng GoDaddy.com (Recently removed)

Thank you Questions ?