Applications over the WAN Growth is in ‘Voice over the WAN’ (doubling over the next year) Mature applications expected to remain stable Some growth in.

Slides:



Advertisements
Similar presentations
BellSouth ® Managed Network VPN Service Next-Generation Network Services for Todays Business Needs.
Advertisements

Prepared By Naieem Khan & Ummiya Rahman Presentation On.
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
ONE PLANET ONE NETWORK A MILLION POSSIBILITIES Barry Joseph Director, Offer and Product Management.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
Alcatel IP Network Division — 1 - Next Generation Services for IP/MPLS Core Networks- Iulian Costea Project Manager - IP Network Division
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SBC Media Briefing Media Update May 9, 2001 Ross Ireland Senior Executive Vice President, Chief Technical Officer Abha Divine Vice President – Corporate.
1 Chapter 12 Remote Network Access Using Remote Connections SLIP and PPP WAN Technologies.
ENTERPRISE NETWORK IMPLEMENTATION
Beyond connectivity Sally Davis, President, Products and Services BT Global Services November 20, 2003.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 1 Remote Network Connectivity Requirements.
INTERNET CONNECTIVITY Joe Muscarella Pentastar Communications.
WAN Technologies. Objectives WAN Technologies Overview WAN Technologies WAN Design.
Virtual Private Network
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
Leased Line. Introduction A leased line is a service contract between a provider and a customer, whereby the provider agrees to deliver a symmetric telecommunications.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
 Sols Group 2002, Corporate Presentation. COMPANY PROFILE.
From circuit to packet switching
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
Frame Relay, ATM and VPN Metropolitan Area Ethernet Overview.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
NG/VITA Strategy & Architecture Tony Shoot
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 2 WAN Technologies Cisco Networking Academy.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Assessment Process Infrastructure Inventories Demographic/User Analysis Financial Modeling Infrastructure Options –Needs versus capacity delivered –Capacity.
Office of Infrastructure Services Division of Communications Brad Watkins Director of Communications.
Global IT Solutions for Multinational Corporations Jim Forbes Vice President Equant IP Solutions Line of Business.
PVN Overview IP-VPN : IP over Virtual Private Network IP-VPN over Frame Relay IP-VPN over ATM MPLS IP-VPN over Gigabit Network IP-VPN over TDM.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—5-1 Establishing Serial Point-To-Point Connections Introducing Wide-Area Networks.
Digital Divide in Russia Alexey Soldatov, RRC “Kurchatov Institute”
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 6 Telecommunications and Networks.
Elijah Suko & Jamie Kuolt. The Connected World  Networks Local Area Network (LAN) Wide Area Network (WAN) Metropolitan Area Network (MAN)
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Virtual Private Network and Customer Relationship Management By: Saeed Baayoun.
Network Architectures and the Advent of Hybrid Cloud Jan 2015
Lecture 1: Introduction to WAN
Small Office / Home Office (SOHO) IP Telephony Who says You Can’t Run with the Big Dogs?
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
DSL Business Services ITU/BDT Arab Regional Workshop on “DSL Technologies and Services” Cairo - Egypt, 4-6 March 2003 ITU/BDT Arab Regional Workshop on.
Networking Computers Types of Network. Learning Objectives: By the end of this topic you should be able to: compare the characteristics of a local area.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
DVB-RCS systems in corporate networks ITU-CoE Bahrein December 9, 2003 Peter Schellaert.
The way forward for telecoms services Jeremy Steventon-Barnes Data Service Development
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Case Study: Cisco VPN Client
Instructor Materials Chapter 1: WAN Concepts
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Networks
Webinar: Cost Reduction Strategies Using SD-WAN
Module 2: Configure Network Intrusion Detection and Prevention
Virtual Private Network (VPN)
Chapter 1: WAN Concepts Connecting Networks
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
PPPoE Internet Point to Point Protocol over Ethernet
Virtual Private Network
Private Networks.
Presentation transcript:

Applications over the WAN Growth is in ‘Voice over the WAN’ (doubling over the next year) Mature applications expected to remain stable Some growth in videoconferencing NB: Little variation in ‘change’ by Country, Sector or Size of Company, but UK is ahead of the game UK 35% 60% 19% 25% 44% 68% 69% 76% 79% 8% 5% Source: IDC, European WAN Manager Survey end-user organizations across 10 countries

WAN – Changing Architectures Across Europe IPVPNs are taking over from legacy networks WANs in the UK Plans to stop using: Frame Relay 45.2 % ATM18.8 % X % Point-to-point20.0 % Source: IDC, European WAN Manager Survey end-user organizations across 10 countries

MPLS – Ubiquitous Secure Access Service Provider Integrated services management Single Network Solution for all users Virtual Private Network Integrated Network Connection Off Net Dial User Remote site Proxy Server IP MPLS Network Alternative Private Network Internet Leased Line LES Broadband Dial/Mobile Regional Site CRM NOC HQ Small Site Extranet Partner Dial User Leased Line

WAN – Access Technologies DSL is now by far the most popular access technology Many opportunities to migrate access methods (e.g. from dial up) UK = 40% UK = 28% UK = 8% UK = 15% UK = 8% Proportion of total site connections into WAN Source: IDC, European WAN Manager Survey end-user organizations across 10 countries