WCC Needs PTA Jim Ellis Advanced Engineering | BT Design.

Slides:



Advertisements
Similar presentations
crm customer relationship management
Advertisements

Crm customer relationship management 1 The information contained in this presentation is confidential information as per your terms and conditions with.
Current thinking. Subject to change. October 2011 BENEFITS OF BUILDING AN IN-HOUSE CONTENT DISTRIBUTION NETWORK (CDN)
Slide 1 of 7 Turning off Ad-Hoc Mode Ad-Hoc mode can be a real problem for wireless connectivity at meetings. Systems that accidentally enter.
1 The information contained in this Presentation is confidential information as per your terms and conditions with British Telecommunications plc (BT).
1 The information contained in this Presentation is confidential information as per your terms and conditions with British Telecommunications plc (BT).
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
IPv6 over xDSL: The DIODOS Proposal Athanassios Liakopoulos Greek Research & Technology Network International IPv6 Workshop, Kopaonik,
Multimedia over DSL By Phil Moy. May 14, Agenda n DSL Forum Working Text 80 - Multiservice Architecture & Framework Requirements n DSL Forum Working.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
DSL Access Architectures and Protocols. xDSL Architecture.
Chapter 10 Virtual Private Networks. VPN Defined  A segment of the public network made to appear part of a private network so that it can be used to.
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Remote Networking Architectures
Fermilab VPN Service What is a VPN ?.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
A Model of IPv6 Internet Access Service via L2TPv2 Shin Miyakawa NTT Communications 2006/7/10 IETF66th.
1 The information contained in this Presentation is confidential information as per your terms and conditions with British Telecommunications plc (BT).
Introducing Fiddler Web Debugging for Performance and Operations
1 CDMA/GPRS Roaming Proposals Raymond Hsu, Jack Nasielski Feb
Animated slides – showing jumpering changes and product architecture for WLR, LLU, SLU and GEA.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
IPv6 Testing for End Users Experience, Results, Outlook,… Primož Dražumerič.
Going faster and staying in control - Building the world’s biggest NGN Tim Hubbard Head of Technology Futures.
Access Gateway Operation
1 Raiders of the lost Arp Customer A Broadband 1.5 Mbps aDSL ISP Network Edge ISP Network Edge Set-top device converts IP into Video Signal for TV Every.
BT IPStream Products James Appleton 01/09/ BT IPStream Portfolio IP switch Content Provider Corporate High speed IP infrastructure with DSL access.
Crm customer relationship management 1 The information contained in this presentation is confidential information as per your terms and conditions with.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Examining Network Protocols. Overview Introduction to Protocols Protocols and Data Transmissions Common Protocols Other Communication Protocols Remote.
FIG-1 Ethernet DSLAM Wi-Max BTS DSLAM Wi-Max CPE Up to 30kmts INTERNET BACKBONE Location-1 Location-2 Wi-Max CPE BRAS Ethernet Switch FIG 1- DSLAM BACKHAUL.
Consult21 Broadband Products Webinar – 18 th October 2007 Cleo Carris-Jones Mandy Ogbodobri Raf Leadbetter Intro: Bill du Cann.
Consult21 Information is subject to change and is for discussion purposes only. Any dates/timings are the current anticipated timescales and may be subject.
Introduction to 21CN Resilience Tim Hubbard Head of 21CN Solutions Strategy.
1 TOT to NGN By Dr. Kamthon Waithayakul EVP, Office of Engineering TOT Plc.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Crm customer relationship management 1 The information contained in this presentation is confidential information as per your terms and conditions with.
WBC Quality of Service (QoS) Options 23 rd October 2008 Andy Maddocks Dave Brennan Paul Fishburn Paul Burke.
L2TP Chapter 7. Motivation Sometimes we want to tunnel one protocol over another protocol –Maybe the network does not understand how to forward that protocol.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Cloud of Clouds for UK public sector. Cloud Services Integrator.
Crm customer relationship management 1 The information contained in this presentation is confidential information as per your terms and conditions with.
Crm customer relationship management 1 The information contained in this presentation is confidential information as per your terms and conditions with.
1 The information contained in this Presentation is confidential information as per your terms and conditions with British Telecommunications plc (BT).
1 The information contained in this Presentation is confidential information as per your terms and conditions with British Telecommunications plc (BT).
1 The information contained in this Presentation is confidential information as per your terms and conditions with British Telecommunications plc (BT).
IETF66 PANA WG Problem Statement for a time-basis accounting in an "always-on“ Broadband scenario R. Maglione - Telecom Italia
Cisco Router Technology. Overview Topics :- Overview of cisco Overview of cisco Introduction of Router Introduction of Router How Router Works How Router.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
WholeSale Model 10. WholeSale Model This feature enables the Nomadix device to act as an L2TP Access Concentrator (LAC) and initiate single or multiple.
Virtual Private Network Access for Remote Networks
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks
Virtual Private Network
Configured as specific static route
VPN: Virtual Private Network
WSU Linux Users Group By Haven Hash
Real-time information
Examining Network Protocols
Virtual Private Networks
Virtual Private Networks
NAT Configuration For ZyXEL ADSL Wireless Router
Bridge Configuration For ZyXEL ADSL Wireless Router
VPN: Virtual Private Network

Presentation transcript:

WCC Needs PTA Jim Ellis Advanced Engineering | BT Design

BRAS CDD CP Network MSAN/ DSLAM WBC + WCC or IPS-C + WCC MSIL WBC with WCC connected over MSIL to CP network OR IPS-C with WCC connected over MSIL to CP network

BRAS CDD CP Network MSAN/ DSLAM WBC + WCC or IPS-C + WCC MSIL WBC / IPS-C in PTA Mode End user connection (PPP session) In PTA mode, the end user connection (tunnel) ends on the BRAS and at that point the traffic can make a decision. Most traffic will come from the Internet via the CP’s network but there is the choice to select some traffic from CDD (the wCC video storage).

BRAS CDD CP Network MSAN/ DSLAM WBC + WCC or IPS-C + WCC MSIL WBC / IPS-C in L2TP Mode End user connection (PPP session) In L2TP mode, the end user connection (tunnel) continues through the BRAS and into the CP’s network and it is only at the end point of the tunnel that the traffic can make a decision. In this L2TP mode the end user’s tunnel bypasses the decision-making process in the BRAS so traffic cannot be inserted from CDD (the wCC video storage).