A Work Domain Analysis for Virtual Private Networks

Size: px
Start display at page:

Download "A Work Domain Analysis for Virtual Private Networks"

Transcription

1 A Work Domain Analysis for Virtual Private Networks Johnson Kuo & Catherine M. Burns Advanced Interface Design Lab, Department of Systems Design Engineering University of Waterloo, Canada ABSTRACT For businesses, virtual private networking has become a new method of building corporate communication networks. In addition to providing improved flexibility, security and global reach, virtual private networks (VPNs) can offer substantial cost-savings by reducing the dependence on expensive, private leased-line networks and troublesome remote-access solutions. Unfortunately, the deployment and management of such systems may come at a high cost. Depending on the nature of the business relationship between the enterprise and the Internet Service Provider (ISP), the network manager may have to deal with the increasingly daunting task of configuring, operating, and fixing security leaks and other faults in the system as the communication needs of the organization expand and change. However, a new design technique known as ecological interface design (EID) has been shown to be a promising approach for supporting operator tasks in complex work domains, such as nuclear power plants or petrochemical systems. A distinguishing feature of this approach is that display interfaces are designed by first conducting a work domain analysis (WDA), which focuses on identifying the important goals and environmental constraints that govern system behavior. By visually portraying the relationships between system goals, constraints, and the state of physical components in a structured manner, the problemsolving activities of operators can be effectively supported during abnormal or unanticipated situations. Due to the problem-solving nature of VPN management, interfaces for network management tools can be made more effective through the application of EID principles. 1. INTRODUCTION This paper examines the application of a relatively new approach to user interface design in the domain of network management. This innovative approach, known as ecological interface design (EID), has been shown to be useful in designing effective interfaces for complex process control systems such as nuclear power plants, where efficient fault detection and management of unanticipated events are crucial to the operation of the system [7]. The EID approach improves upon traditional user-centered design approaches in these domains by analyzing the work structure of systems in an attempt to identify process goals and constraints that shape the actions of the operator. These constraints may include the intended purpose for which the system was designed, as well as natural and physical laws that govern the behavior of the system. Also, these constraints govern operator behavior because they limit the range of control actions that they can perform with respect to accomplishing various management and fault detection tasks [6]. The unique feature of user interfaces designed with this approach is that they portray system state information in a way that visually reveals the relationships among system goals, process constraints, and the state of the physical components. By displaying information in a goaloriented way, problems or anomalies that develop during the operation of the system can be easily identified and diagnosed by examining the structural relationships between process variables. The operator can therefore easily assess how changes to various component states will affect the overall goals of the system, thereby suggesting subsequent actions to consider. Thus, the important implication with respect to interface design is that the complete set of goal-relevant constraints needs to be represented in order for the operator to effectively optimize system performance and manage faults that occur within the system. In order to identify all the relevant constraints within a system, a work domain analysis (WDA) needs to be performed. WDA is an analytical approach developed by Rasmussen [4] and summarized by Vicente [6] which essentially captures the relationships between different variables of the system at various hierarchical levels of abstraction. It forms the primary information needs analysis that drives the design approach of EID. To date, EID has been successfully applied to a variety of work domains such as petrochemical processing [2] and biomedical applications [1]. Given the relatively recent rapid growth of the enterprise networking industry, this paper examines how WDA and EID can also bring value to the domain of virtual private network (VPN) management through a proof-of-concept work domain analysis. By demonstrating how management of a VPN system can be described through a decomposition of relevant variables into an abstraction hierarchy, meaningful relationships within the system can be mapped out into a design for an effective interface.

2 This paper will begin by first examining some of the fundamental concepts and components of a virtual private network and discuss how such a system is a good candidate for applying the techniques of ecological interface design. A work domain analysis will then be performed for the domain of managing virtual private networks, with particular emphasis placed upon the setup and configuration aspects. The goal of this analysis is to essentially provide a model of the VPN system. In this way, the potential of WDA for the VPN domain will be demonstrated. The paper will then conclude with an assessment of the design requirements needed to implement the knowledge gained from the WDA into an interface design. 2. VIRTUAL PRIVATE NETWORKS A virtual private network is commonly defined as the secure transport of private traffic over a public or shared IP network, using a combination of tunneling, encryption, authentication, and access control technologies [5]. As such, the purpose of VPNs is to extend the corporate network out to distant branch offices, sales people, and business partners as well as remote and/or telecommuting employees [3]. But rather than using expensive leased lines, VPNs use worldwide IP network services, such as the Internet or a service provider s IP backbones, to transmit private data between corporate sites. With such a setup, remote users, for example, can dial in by simply making local Internet calls, thus saving the company expensive long-distance charges. Generally speaking, VPNs provide enterprises, both large and small, with several key benefits [8]: they allow network managers to cost-effectively increase the span of the corporate network; they enable remote users to easily and securely access their corporate enterprise; and they permit corporations to securely communicate with business partners. Thus, the general idea behind using a VPN is that a company can reduce the recurring telecommunications charges that are incurred when connecting remote users and branch offices to resources in its corporate headquarters. While VPN solutions can offer significant benefits to network managers with respect to lowering networking costs, there is inevitably extra work that comes as a result of having to plan, deploy, and manage such a system. When it comes to integrating any new technology into a business network, a number of common concerns must always be addressed, including interoperability, scalability, security, reliability and performance [3]. Given the wide range of issues that network managers must contend with, it is very important that the software tools they use are designed to explicitly support their daily tasks. In order to achieve this, these tools should be designed with primary consideration given to the constraints that the environment imposes upon operator actions. One of the key features of the ecological approach to user interface design is the great emphasis placed on analyzing the semantics of the work domain. By structuring elements within this domain into a meaningful relationship that ties together the various components with the goals and constraints of the system, a more effective interface can be designed to support operator tasks within a complex work environment. Indeed, the domain of VPN systems management seems to be a good candidate for applying the ecological approach, as these systems are often large, complex systems which are characterized by both physical and logical constraints and capabilities. As well, problemsolving tasks are particularly relevant in such a domain, as rapid fault detection and diagnosis is often crucial to the successful operation of the business. Since EID is specifically geared toward supporting operator problemsolving tasks in unanticipated situations, the domain of VPN management may benefit considerably from using this approach. 3. WORK DOMAIN MODEL A work domain model consists of an abstraction hierarchy analysis conducted across several levels of detail in a system. Typically, five levels of abstraction are used and are defined as follows [4]: Functional Purpose: the overall goals or purposes of the designed system Abstract Function: the first principles and conservation laws that govern the functioning of the system Generalized Function: the physical processes of the domain Physical Function: the capabilities and interconnections of physical components in the system Physical Form: the physical appearance and condition of components as well as their locations Generally, the main idea behind analyzing a work domain using this hierarchical model is that one s understanding of a system will increase by moving vertically among the different levels. For example, by moving up the hierarchy, one can gain a deeper understanding of various components with respect to system goals, while moving down the hierarchy reveals how these goals are carried out. By following the links and interconnections between elements of the domain through these different levels, one can determine the how and why of any particular aspect of the system and determine the fundamental relationships and constraints that exist for the domain.

3 TABLE 1. Abstraction hierarchy model for VPN management. Level Performance Security Functional Purpose Abstract Function Maximize availability of connections. Minimize latency and data loss. Maintain path availability of information flow between sources and sinks. Minimize unauthorized access. Maintain path integrity of information flow across the public network. Generalized Function Traffic routing and prioritization processes. Tunneling, encryption, authentication, and access control processes. Physical Function Capabilities of routers, switches, hubs, as well as efficiency of encryption-decryption algorithms. Capabilities of data encryption and authentication devices (e.g. security gateways, firewalls), and tunneling protocols (e.g. IPSec, PPTP, L2TP). Physical Form Physical locations and forms of these Physical locations and forms of these Table 1 provides a description of the various levels of the abstraction hierarchy for the domain of VPN management. These levels are analyzed in terms of both performance and security management domains, which constitute the two major areas of concern involved with managing a VPN. A discussion of the fundamentals of the work domain model at each level of abstraction is presented below. Functional Purpose The functional purpose of a VPN is to give users a secure way to access corporate network resources over the Internet or other public or shared networks. Because private data travels over public or shared lines and equipment, such as the Internet, concerns regarding performance and security become a central issue in the deployment and management of VPNs. Since not all elements of the network are under the corporate enterprise s control, security measures must be in place to prevent unauthorized access or illegal intrusions from other parties sharing the same resources. Likewise, reliability and performance also become a major concern, since Internet-based VPNs are subject to the same performance problems that Internet traffic experiences. Specifically, performance problems may be viewed in terms of network availability (or uptime), round-trip transmission delay (or latency), and amount of data loss during transmission. All of these factors must be carefully considered and managed by the network manager to ensure that the communication services over these networks are functioning as expected. In this regard, service level agreements (SLAs) are an increasingly popular method for documenting expectations as to what level of network performance a service provider is able to provide. For the purposes of structuring and understanding the work domain, the functional purpose of a VPN is stated in terms of the outputs of the system. In this case, two of the most important issues involved in its deployment, namely security and performance management, are described according to their functional objectives. By stating the problem in terms of a desired goal, such as minimizing unauthorized access or maximizing network availability, a framework is provided for structuring the rest of the elements in the work domain. In this way, one can observe how each of the important objectives in the work domain are achieved by moving down through the various levels of the hierarchy and identifying progressively more concrete representations or views of the domain. Abstract Function The abstract function layer provides a view of the causal structure of the system. At this level, VPN management could be described in terms of information flow from one point to another. Information is generated at some source, representing the originator or sender of the information, and is transferred through some medium to the intended recipient, or sink for that information. To ensure proper delivery, the transfer mechanism must not only ensure that there are available paths to connect the source and sinks of the information flow, but it must also ensure that the information is preserved or conserved as it travels through the public, shared medium. While this conservation principle has a different meaning than that applied to mass and energy flow systems, it is nevertheless useful to describe network systems in these terms. Just as conservation of mass and energy would apply to physical systems, conservation of information needs to take place to make the VPN (or indeed any communication) system work. Thus, the information generated by Source A must be transferred unseen and unaltered to its intended recipient at Sink A; similarly, information from Source B must pass unseen and altered to Sink B, and so on. If the information from Source A were somehow directed to a sink other than Sink A, for instance, then the security constraint of the system would be compromised. Similarly, a security risk is involved if Sink A receives unwanted information or worse yet, unauthorized access requests from an unknown source that is masquerading as Source A.

4 The abstract functions here could be described in terms of path availability and path integrity. Path availability refers to whether there are paths with sufficient capacity leading from the source to the intended sink. The capacity of these paths must be sufficient in order to transfer the information from source to sink at an acceptable rate; otherwise, these paths could not be considered available. Obviously, the larger the capacity of these pipes, the faster the information could flow through them, which connects with the performance criteria located at the functional purpose level. Similarly, path integrity refers to whether the information that is entering one side of the virtual pipe is coming out the corresponding end on the other side. In other words, the information must not have been redirected to another sink, and only the intended recipient receives the information. Thus, the integrity of the path needs to be preserved in order to satisfy the security criteria located at the functional purpose level. Generalized Function At the generalized function level, the representation of the work domain changes to a view of the processes by which the abstract functions are carried out. For example, path availability is achieved through the traffic routing process of the underlying system. Since multiple paths are available in transferring information from one point to another, the performance of a network will mostly be determined by how efficiently the traffic is routed through to its destination, given the current traffic load on the system. Thus, the traffic routing process will, in large part, determine path availability and the overall speed of transmission over the public backbone. Path integrity, on the other hand, is achieved through various processes tunneling, encryption, authentication, and access control all of which are designed to keep information that is sent over the shared backbone private. The overall purpose of these processes is to separate and insulate each customer s traffic such that other parties cannot access or compromise the confidentiality of the data. Tunneling and data encryption techniques achieve this feat by essentially establishing end-to-end pipes or tunnels across the Internet or service provider s IP backbone and then encrypting the information within those tunnels to prevent anyone from being able to read it, even if the data is intercepted during transport. The authentication process is also important to guarantee that the person at the other end of a network connection is who they say they are. Unless users, services, and networks can be reliably authenticated, it will be impossible to control access to corporate resources and to preserve the path integrity of the data in transit. Physical Function The physical function layer deals with the actual components and physical or logical implementations of the processes described above. These include the actual physical routers, switches, hubs and lines that comprise the backbone infrastructure over which the company data is sent. It also includes the security gateways, policy servers and firewalls at the corporate or customer sites, which are necessary to implement the security processes described at the generalized function layer. In addition, software protocols are also described at this layer since it represents the logical implementations that make the transfer of information and provision of security across a network possible. Physical Form At the physical form level, components in the domain are described with respect to their appearance, location, and physical condition. This will include, for instance, the relative locations of the various sites that need to be interconnected. Such information could be important in determining the cost savings that can be achieved through implementation of a VPN, which would not be dependent on mileage charges in the same way that traditional private leased lines are. 4. DESIGN RECOMMENDATIONS Based on information gathered for each of the different levels in the abstraction hierarchy model that was developed here, several general recommendations have been made with respect to designing an interface to support the task of VPN management. These recommendations include the following: Design an interface that allows administrators to easily monitor how closely they are achieving overall system objectives. Since overall system objectives, as indicated in the functional purpose of the abstraction hierarchy, are tied directly to performance level guarantees that are outlined in an SLA, these targets should be clearly displayed in relation to actual performance levels being achieved. This way, the network administrator can easily track whether performance levels are being met as expected. If actual levels fall dangerously close to or below these targets, the administrator can focus his attention in those areas that need to be fixed to correct the situation and maintain overall performance objectives. Display logical tunnels and information paths that allow administrators to see the overall flows within the system. A graphical representation of the overall system should be provided that shows where information originates (source) and terminates (sink), as shown in the abstract function level of the hierarchy. Ideally, the display should show the correct paths of information flow as configured by the administrator, and any deviations from this path created by path diversion or intrusion from an outside source should be made apparent. Should this scenario occur, the display should also be designed to

5 support the administrator in locating the source of the security leak. Provide the ability to monitor and/or control the various processes that support the performance and security objectives of the system. system, the administrator can more easily track how changes that are made at lower levels of the abstraction hierarchy contribute to overall system objectives. TABLE 2. Design requirements generated from an abstraction hierarchy. Generally, there will be times (e.g. at a testing stage) when the administrator will want to know whether the general processes of the system, such as tunneling, encryption, authentication, and routing are operating or performing as expected. Such processes, found at the generalized function level, should be displayed in such a way as to allow the administrator to easily check if they are functioning as configured. The result of any changes to such configurations should be made immediately visible or known to the administrator from the display. Provide an efficient way for the administrator to monitor and control the settings and configurations of the equipment and components in the system. Typically, a VPN setup consists of a large number of point-to-point tunnels between various sites, which need to be individually configured and managed between their respective end points. Consequently, very large meshed configuration topologies become virtually impossible to maintain and control, unless an automated configuration process was in place. Indeed, what may be needed is a centralized provisioning of information for large-scale networks that allows for a policy-driven automation of security and topology configurations [5]. In this way, network and security parameters can be configured only once rather than multiple times to accommodate each location, which would definitely help to simplify the management tasks for a particular VPN setup. Display a topological view of the network to show locations of different sites and equipment and how they are connected. Clearly, the administrator must have an idea of where everything is in the system (physical form) and how they are each connected together in order to be able to locate different problem areas in the system. In a problemsolving situation, a geographical representation of the network showing the locations of various physical equipment on different sites can help the administrator in quickly finding the correct equipment or component which needs to be fixed or replaced. These design recommendations are summarized in Table 2, which shows how they relate to each of the levels in the abstraction hierarchy. This structure is particularly useful in relating VPN configuration tasks to the overall purpose and goals of the system, which is to ensure that the performance levels as outlined in an SLA are being achieved while maintaining network security. By linking the low-level configuration aspects of the VPN equipment with the high-level functional purposes of the Level Functional Purpose Abstract Function Generalized Function Physical Function Physical Form Design Requirement Performance target views Information flow paths and tunnel configuration views Routing, tunneling, and encryption process views Setup and configuration of equipment and components Topological network views, component locations 5. COMPARISON WITH PROCESS CONTROL MODELS Traditionally, work domain analysis has been performed in process control domains, such as in nuclear power plants or petrochemical systems, which are governed by familiar mass and energy conservation principles. For example, these systems usually deal with some form of mass and energy conversion or transfer process, which can easily be characterized by precise mathematical equations that ultimately determine the constraints and behavior of the system. As well, these systems usually have well-defined, centralized physical components with specific functions that do not constantly change or need to be upgraded to maintain overall performance. Using the EID approach, the work domain can thus be structured to reveal problems within the system through higher-order relations, even in unanticipated situations. For example, the failure of one physical component can result in performance anomalies in several related processes in the system. The effects of the failure can thus be easily seen, as they will be manifested in changes in higher order relationships. Diagnosis of which component has failed then becomes a relatively simple task of tracing these changes to the source of the problem via the structural links provided by the abstraction hierarchy. Although the domain of VPN management shares some characteristics with that of process control systems, there are key differences in this domain that present some interesting challenges to the application of this technique. In contrast to process control systems, computer networks represent domains that are characterized by rapid technological change, extreme decentralization, and the existence of abstract processes or components which are difficult to quantify. For, example, although it is possible to use available bandwidth capacity, latency, packet loss, and so on as a measure of network performance, it is not so easy to

6 quantify network security. No quantitative value can be associated with security, and yet it is a vital component to VPNs. Thus, one major challenge in this domain is determining how to represent such abstract concepts in relation with other elements in the domain. In addition, components of a VPN system are subject to constant changes in terms of their capabilities. Though routers, hubs, and the like are not often prone to failure, they usually have a short life cycle due to rapid advances in technology. New upgrades of various VPN hardware and software products are constantly incorporating more and more features and functionality, which may provide benefits in terms of increased performance or security, but may also adversely affect system manageability. Thus, another challenge is figuring out how to capture the dynamic variability of information in the domain, which traditionally has never needed to be addressed. Even though the domain of VPN management represents a relatively new and different domain than those that have been analyzed previously, much of the same principles and benefits of performing a work domain analysis still apply. In particular, the new challenges that have come up as a result of the different characteristics of this domain can still be addressed, because they do not represent a limitation of the technique. For instance, domain variables identified in the abstraction hierarchy do not always need to be associated with a quantitative variable [2]. Qualitative elements that represent abstract concepts, such as network security, are equally important and integral to the system model, because operators can still use qualitative concepts in their reasoning process. Thus, the challenge of representing abstract concepts in the abstraction hierarchy can be overcome. As well, despite the dynamic nature of elements in the lower levels, the abstraction hierarchy is still well suited to structuring the information in the domain in a way that supports operator tasks. Because the basic purposes of the various components do not change, the higher level functions represented in the abstraction hierarchy are seldom modified by new technology. These changes are manifested only in lower levels which deal with the physical components of the system or their particular capabilities and configurations. This particular property of the work domain model has strong implications for its application to different VPN situations. If differences between multiple VPN setups lie primarily at the physical form and function levels of abstraction, then the higher levels of abstraction are likely to remain relatively consistent. This, of course, suggests that once an abstraction hierarchy is developed for a particular VPN setup, it can be adapted to other situations by modifying only the lower levels of the hierarchy. Thus, the flexibility afforded by the abstraction hierarchy makes it a very viable technique for analyzing the domain of VPN management. 6. CONCLUSION This work presents the first WDA conducted in the domain of network management, representing a large shift from closed-loop process control systems, in which this method of analysis has traditionally been applied. Several general design recommendations have been made as a result of this study, which focus on simplifying VPN configuration, fault diagnosis, and coping with dynamic system variability. One of the new concepts introduced in this study is the modeling of information flow as a conservation principle, which leads to a very useful model of the work domain. Unlike traditional process control systems, however, VPNs are characterized by rapid technological change and extreme decentralization. Consequently, a major challenge in applying the EID approach to this domain is coping with the dynamic variability of components within the system. Nevertheless, the nature of the problem-solving task, the complexity of the work domain, and the physical nature of the system make this domain an excellent candidate for ecological interface design. ACKNOWLEDGEMENTS This research has been supported by a grant from Nortel Networks Canada and a contract from CITO, Communications and Information Technology Ontario. REFERENCES [1] Hajdukiewicz, J. R., Doyle, D. J. Milgram, P., Vicente, K. J. & Burns, C. M. (1998). A work domain analysis of patient monitoring in the operating room. Proceedings of the Human Factors and Ergonomics Society 42 nd Annual Meeting, pp [2] Jamieson, G. A. & Vicente, K. J. (1998). Modeling techniques to support abnormal situation management in the petrochemical processing industry. CSME Forum SCGM, Vol. 3, pp [3] Kosiur, D. (1999). Building and Managing Virtual Private Networks, New York: John Wiley & Sons. [4] Rasmussen, J. (1985). The role of hierarchical knowledge representation in decisionmaking and system management. IEEE Transactions on Systems, Man, and Cybernetics. SMC-15, pp [5] Salamone, S. (1998). VPN Alliance White Paper. [6] Vicente, K. J. (1999). Cognitive Work Analysis: Towards Safe, Productive, and Healthy Computer-based Work. Mahwah, NJ: Lawrence Erlbaum. [7] Vicente, K. J. & Rasmussen, J. (1992). Ecological interface design: theoretical foundations. IEEE Transactions on Systems, Man, & Cybernetics. SMC-22, pp [8] VPNet Technologies Inc. (1999). Managed VPN Services: Marketing Opportunities and Paths for Implementation White Paper.

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

Secure VPNs for Enterprise Networks

Secure VPNs for Enterprise Networks Secure Virtual Private Networks for Enterprise February 1999 Secure VPNs for Enterprise Networks This document provides an overview of Virtual Private Network (VPN) concepts using the. Benefits of using

More information

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang School of Computer Sciences Universiti Sains Malaysia Pulau Pinang Information Security & Assurance Assignment 2 White Paper Virtual Private Network (VPN) By Lim Teck Boon (107593) Page 1 Table of Content

More information

Transform your network and your customer experience. Introducing SD-WAN Concierge

Transform your network and your customer experience. Introducing SD-WAN Concierge Transform your network and your customer experience Introducing SD-WAN Concierge Optimize your application performance, lower your total cost of ownership and simplify your network management. 2X Bandwith

More information

Intranets and Virtual Private Networks (VPNs)

Intranets and Virtual Private Networks (VPNs) Intranets and Virtual Private Networks (VPNs) Definition Private networking involves securely transmitting corporate data across multiple sites throughout an entire enterprise. Creating a truly private

More information

Transform your network and your customer experience. Introducing SD-WAN Concierge

Transform your network and your customer experience. Introducing SD-WAN Concierge Transform your network and your customer experience Introducing SD-WAN Concierge Optimize your application performance, lower your total cost of ownership and simplify your network management. 2X Bandwith

More information

Cisco How Virtual Private Networks Work

Cisco How Virtual Private Networks Work Table of Contents How Virtual Private Networks Work...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Background Information...1 What Makes a VPN?...2 Analogy:

More information

Seven Criteria for a Sound Investment in WAN Optimization

Seven Criteria for a Sound Investment in WAN Optimization Seven Criteria for a Sound Investment in WAN Optimization Introduction WAN optimization technology brings three important business benefits to IT organizations: Reduces branch office infrastructure costs

More information

Automating VPN Management

Automating VPN Management Automating VPN Management By Scott Hilton, Vice President Product Management Assured Digital, Inc. Although many network managers, users and executives agree on the benefits of virtual private networking,

More information

RingCentral White Paper UCaaS Connectivity Options in the New Age. White Paper. UCaaS Connectivity Options in the New Age: Best Practices

RingCentral White Paper UCaaS Connectivity Options in the New Age. White Paper. UCaaS Connectivity Options in the New Age: Best Practices White Paper UCaaS Connectivity Options in the New Age: Best Practices 1 Today s IT stacks are cloud-first, taking advantage of the many benefits of SaaS applications, while answering the increasing needs

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

Logical Network Design (Part II)

Logical Network Design (Part II) Logical Network Design (Part II) DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS IIT, Abbottabad Pakistan Telecommunication Network Design (TND) Possible (Part

More information

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing

More information

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS P. Fidry, V. Rakotomanana, C. Ausanneau Pierre.fidry@alcatel-lucent.fr Alcatel-Lucent, Centre de Villarceaux, 91620, Nozay, France Abstract: As a consequence of

More information

Custom Connect. All Area Networks. customer s guide to how it works version 1.0

Custom Connect. All Area Networks. customer s guide to how it works version 1.0 All Area Networks Custom Connect customer s guide to how it works version 1.0 The information in this technical user guide and the glossary of terms has been prepared in good faith and is correct at the

More information

Campus Network Design

Campus Network Design Modular Network Design Campus Network Design Modules are analogous to building blocks of different shapes and sizes; when creating a building, each block has different functions Designing one of these

More information

Optimal Network Connectivity Reliable Network Access Flexible Network Management

Optimal Network Connectivity Reliable Network Access Flexible Network Management The Intelligent WA Load Balancer Aggregating Links For Maximum Performance Optimal etwork Connectivity Reliable etwork Access Flexible etwork Management Enterprises are increasingly relying on the internet

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-088) You are the administrator for medium-sized network with many users who connect remotely. You have configured a server running Microsoft Windows Server 2003,

More information

Campus Network Design. 2003, Cisco Systems, Inc. All rights reserved. 2-1

Campus Network Design. 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design 2003, Cisco Systems, Inc. All rights reserved. 2-1 Design Objective Business Requirement Why do you want to build a network? Too often people build networks based on technological,

More information

Verizon Software Defined Perimeter (SDP).

Verizon Software Defined Perimeter (SDP). Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.

More information

MASERGY S MANAGED SD-WAN

MASERGY S MANAGED SD-WAN MASERGY S MANAGED New Performance Options for Hybrid Networks Business Challenges WAN Ecosystem Features and Benefits Use Cases INTRODUCTION Organizations are leveraging technology to transform the way

More information

Multi-Dimensional Service Aware Management for End-to-End Carrier Ethernet Services By Peter Chahal

Multi-Dimensional Service Aware Management for End-to-End Carrier Ethernet Services By Peter Chahal Multi-Dimensional Service Aware Management for End-to-End Carrier Ethernet Services By Peter Chahal We all know Ethernet based on its long history as the LAN connectivity technology of choice. Recently,

More information

NetPro. from Wireless Logic. Available on a per SIM license basis. No CAPEX. Retain your Airtime Contracts with your existing providers

NetPro. from Wireless Logic. Available on a per SIM license basis. No CAPEX. Retain your Airtime Contracts with your existing providers NetPro from Available on a per SIM license basis Real-time usage monitoring of Data SIMs Retain your Airtime Contracts with your existing providers No CAPEX Secure and resilient connectivity via VPN Be

More information

ARM Security Solutions and Numonyx Authenticated Flash

ARM Security Solutions and Numonyx Authenticated Flash ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware

More information

90 % of WAN decision makers cite their

90 % of WAN decision makers cite their WHITEPAPER So many ways to WAN How the most essential technology for distributed enterprises has evolved and where it s headed One of the most critical components to the success of any growth-oriented

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable

More information

Data Center Interconnect Solution Overview

Data Center Interconnect Solution Overview CHAPTER 2 The term DCI (Data Center Interconnect) is relevant in all scenarios where different levels of connectivity are required between two or more data center locations in order to provide flexibility

More information

VPN Overview. VPN Types

VPN Overview. VPN Types VPN Types A virtual private network (VPN) connection establishes a secure tunnel between endpoints over a public network such as the Internet. This chapter applies to Site-to-site VPNs on Firepower Threat

More information

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud W H I T E P A P E R : O P E N. V P N C L O U D Implementing A Secure OpenVPN Cloud Platform White Paper: OpenVPN Cloud Platform Implementing OpenVPN Cloud Platform Content Introduction... 3 The Problems...

More information

EVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER

EVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER WHITE PAPER EVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER Overview Enterprises lose $700 billion from downtime; losses fall into three categories: lost revenue (17%), lost productivity (73%), and

More information

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES CASE STUDY Application of High-Assurance Network Encryption Sector : Use Case: Solution: CCTV security HD video Layer 2 network architecture A Major

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Data Sheet Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building

More information

SECURE DATA EXCHANGE

SECURE DATA EXCHANGE POLICY-DRIVEN SOLUTIONS FOR SECURE DATA EXCHANGE Sending and receiving data is a fundamental part of daily business for nearly every organization. Companies need to share financial transaction details,

More information

Five Key Considerations When Implementing Secure Remote Access to Your IIoT Machines. Blanch Huang Product Manager

Five Key Considerations When Implementing Secure Remote Access to Your IIoT Machines. Blanch Huang Product Manager Five Key Considerations When Implementing Secure Remote Access to Your IIoT Machines Blanch Huang Product Manager Abstract Industrial IoT (IIoT) and smart factory trends are redefining today s OEM business

More information

VIRTUAL PRIVATE NETWORKS (VPN)

VIRTUAL PRIVATE NETWORKS (VPN) VIRTUAL PRIVATE NETWORKS (VPN) Cisco on Cisco E-Learning Series - Executive Track TRANSCRIPT INTRODUCTION Helping employees work productively anytime, anywhere is a necessity in many organizations. Offering

More information

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers 31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network

More information

IPv6-based Beyond-3G Networking

IPv6-based Beyond-3G Networking IPv6-based Beyond-3G Networking Motorola Labs Abstract This paper highlights the technical issues in IPv6-based Beyond-3G networking as a means to enable a seamless mobile Internet beyond simply wireless

More information

CDW LLC 200 North Milwaukee Avenue, Vernon Hills, IL

CDW LLC 200 North Milwaukee Avenue, Vernon Hills, IL Coordinating Conferencing and Collaboration Vital unified communications capabilities offer a solid foundation for an integrated view of the collaborative environment. To make the most of the opportunities

More information

The Modern Manufacturer s Guide to. Industrial Wireless Cisco and/or its affiliates. All rights reserved.

The Modern Manufacturer s Guide to. Industrial Wireless Cisco and/or its affiliates. All rights reserved. The Modern Manufacturer s Guide to Industrial Wireless 2017 Cisco and/or its affiliates. All rights reserved. The Modern Manufacturer s Guide to Industrial Wireless Page 2 It s hard to imagine an effective

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!  We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ We offer free update service for one year Exam : 640-861 Title : CCDA Cisco Certified Design Associate Vendors : Cisco Version : DEMO Get Latest &

More information

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE (4/20/07) WHO IS KERIO? Kerio Technologies provides Internet messaging and firewall software solutions for small to medium sized networks,

More information

Deployment Scenarios for Standalone Content Engines

Deployment Scenarios for Standalone Content Engines CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This

More information

WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER

WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER WHITE PAPER BCDR: 4 CRITICAL QUESTIONS FOR YOUR COMMUNICATIONS PROVIDER Insurance for IT Infrastructure? We can buy insurance for contract performance, pitching arms and even vacations. But when it comes

More information

Industrial Control System Security white paper

Industrial Control System Security white paper Industrial Control System Security white paper The top 10 threats to automation and process control systems and their countermeasures with INSYS routers Introduction With the advent of M2M (machine to

More information

SERVICE DESCRIPTION MANAGED FIREWALL/VPN

SERVICE DESCRIPTION MANAGED FIREWALL/VPN Contents Service Overview.... 3 Key Features... 3 Service Features... 3 Responsibilities... 5 Additional Services.... 5 Implementation... 6 Validation... 6 Implementation Process.... 6 Customer Kick-Off...

More information

INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK

INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK CASE STUDY Application of High-Assurance Network Encryption Sector: Use Case: Solution: Government CCTV security Real-time HD video transmission across Layer

More information

THE COMPLETE FIELD GUIDE TO THE WAN

THE COMPLETE FIELD GUIDE TO THE WAN THE COMPLETE FIELD GUIDE TO THE WAN People interested in setting up a wide-area network (WAN) often have very specific reasons for wanting to do so. WANs are specialized technological tools that deliver

More information

Authenticating on a Ham Internet

Authenticating on a Ham Internet Authenticating on a Ham Internet The FCC regulations for amateur radio, part 97, rule that encryption cannot be used to obscure the meaning of communications. Many read the rules and assume that there

More information

Frame Relay or Internet VPNs

Frame Relay or Internet VPNs White Paper X E D I A Frame Relay or Internet VPNs The Landscape for Next Generation Business Applications Escalating network operating costs and the scarcity of trained management personnel are two main

More information

EMC Celerra Replicator V2 with Silver Peak WAN Optimization

EMC Celerra Replicator V2 with Silver Peak WAN Optimization EMC Celerra Replicator V2 with Silver Peak WAN Optimization Applied Technology Abstract This white paper discusses the interoperability and performance of EMC Celerra Replicator V2 with Silver Peak s WAN

More information

Carrier Ethernet White-Paper

Carrier Ethernet White-Paper Carrier Ethernet White-Paper Version 1.0 Carrier Ethernet White-Paper Doc-No.: wp_1611mef Version 1.0 Contacts Copyright Note arcutronix GmbH Garbsener Landstraße 10 D-30419 Hannover, Germany Tel.: +49

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

CtrlS Datacenters Placement Questions And Answers

CtrlS Datacenters Placement Questions And Answers DATA CENTER Q1. What is Data Center? Data centers are physical or virtual infrastructure used by enterprises to house computer, server and networking systems and components for the companys information

More information

Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites

Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites The recommended knowledge and skills that a learner must have before attending this course are as follows: Knowledge

More information

Hybrid Cloud for Business Communications

Hybrid Cloud for Business Communications Hybrid Cloud for Business Communications THE ESSENTIAL GUIDE So you re considering hybrid cloud for your business communications. You re not alone! In fact, more and more businesses are turning to cloud

More information

Certified SonicWALL Security Administrator (CSSA) Instructor-led Training

Certified SonicWALL Security Administrator (CSSA) Instructor-led Training Instructor-led Training Comprehensive Services from Your Trusted Security Partner Additional Information Recommended prerequisite for the Certified SonicWALL Security Administrator (CSSA) exam Course Description:

More information

Network Service Description

Network Service Description Network Service Description Applies to: Office 365 Dedicated Topic Last Modified: 2015-09-03 Contents... 1 Network Architecture... 2 Customer Connectivity to Services... 5 Customer-Owned Private Network

More information

IP ALL THE WAY TO THE BEDHEAD

IP ALL THE WAY TO THE BEDHEAD IP ALL THE WAY TO THE BEDHEAD THE BENEFITS OF FULLY IP NURSE CALL SYSTEMS A S F E A T U R E D I N B U I L D I N G B E T T E R H E A L T H C A R E IP all the way - to the bedhead Wandsworth Healthcare were

More information

Chapter 8: Subnetting IP Networks

Chapter 8: Subnetting IP Networks Chapter 8: Subnetting IP Networks Designing, implementing and managing an effective IP addressing plan ensures that networks can operate effectively and efficiently. This is especially true as the number

More information

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs) CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure

More information

SD-WAN Transform Your Agency

SD-WAN Transform Your Agency Federal SD-WAN Transform Your Agency 1 Overview Is your agency facing network traffic challenges? Is migration to the secured cloud hogging scarce bandwidth? How about increased mobile computing that is

More information

2. INTRUDER DETECTION SYSTEMS

2. INTRUDER DETECTION SYSTEMS 1. INTRODUCTION It is apparent that information technology is the backbone of many organizations, small or big. Since they depend on information technology to drive their business forward, issues regarding

More information

Continuous auditing certification

Continuous auditing certification State of the Art in cloud service certification Cloud computing has emerged as the de-facto-standard when it comes to IT delivery. It comes with many benefits, such as flexibility, cost-efficiency and

More information

WHITE PAPER ULTRA LOW LATENCY MICROWAVE THE NEED FOR SPEED: BEST PRACTICES FOR BUILDING ULTRA-LOW LATENCY MICROWAVE NETWORKS

WHITE PAPER ULTRA LOW LATENCY MICROWAVE THE NEED FOR SPEED: BEST PRACTICES FOR BUILDING ULTRA-LOW LATENCY MICROWAVE NETWORKS THE NEED FOR SPEED: BEST PRACTICES FOR BUILDING ULTRA-LOW LATENCY MICROWAVE NETWORKS JULY 2012 TABLE OF CONTENTS INTRODUCTION... 3 MICROWAVE: THE NEW DEFAULT TRANSPORT FOR LOW LATENCY APPLICATIONS... 3

More information

Data center interconnect for the enterprise hybrid cloud

Data center interconnect for the enterprise hybrid cloud WHITEPAPER Data center interconnect for the enterprise hybrid cloud The world is moving to the cloud. Everything from entertainment and consumer mobile applications to enterprise software and government

More information

Cisco ISR G2 Management Overview

Cisco ISR G2 Management Overview Cisco ISR G2 Management Overview Introduction The new Cisco Integrated Services Routers Generation 2 (ISR G2) Family of routers delivers the borderless network that can transform the branch office and

More information

Introduction to Cisco ASR 9000 Series Network Virtualization Technology

Introduction to Cisco ASR 9000 Series Network Virtualization Technology White Paper Introduction to Cisco ASR 9000 Series Network Virtualization Technology What You Will Learn Service providers worldwide face high customer expectations along with growing demand for network

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

VPN Virtual Private Networks

VPN Virtual Private Networks VPN Virtual Private Networks Mathias Schäfer WS 2003/2004 Overview 2 Overview Why VPNs VPN-use-cases Requirements Security Performance Conclusion Why VPNs 3 Why VPNs In business-solutions VPN-technology

More information

Analysis of VPN Protocols

Analysis of VPN Protocols Analysis of VPN Protocols ECE 646 Final Project Presentation Tamer Mabrouk Touhidur Satiar Overview VPN Definitions Emergence of VPN Concept of Tunneling VPN Classification Comparison of Protocols Customer

More information

Virtual Private Networks

Virtual Private Networks NEXTEP Broadband White Paper Virtual Private Networks Solutions for cost-effective, high-speed corporate extranets and wide-area networks. A Nextep Broadband White Paper May 2001 Broadband Networks Group

More information

Evaluating networking technologies

Evaluating networking technologies Evaluating networking technologies Navigating through the latest range of networking solutions can be challenging for enterprises aiming to improve their productivity and efficiency. They need to select

More information

Choosing the Right. Ethernet Solution. How to Make the Best Choice for Your Business

Choosing the Right. Ethernet Solution. How to Make the Best Choice for Your Business Choosing the Right Ethernet Solution How to Make the Best Choice for Your Business TABLE OF CONTENTS Introduction 3 CH. 1 Why Do Organizations Choose Ethernet? 4 CH. 2 What Type of Ethernet Solutions Will

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

INTRODUCTION TO ICT.

INTRODUCTION TO ICT. INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO

More information

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Module 1. Introduction. Version 2, CSE IIT, Kharagpur Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical

More information

University of San Francisco Course Syllabus and Outline

University of San Francisco Course Syllabus and Outline College of Professional Studies BSIS 340 Business Data Networks and Telecommunications University of San Francisco Fall Semester 2008 Robert C. Hughes, M.S. Email: rchughes3@usfca.edu Enrolled Student

More information

A Flexible Model for Resource Management in Virtual Private Networks. Presenter: Huang, Rigao Kang, Yuefang

A Flexible Model for Resource Management in Virtual Private Networks. Presenter: Huang, Rigao Kang, Yuefang A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang Overview Introduction of VPN Hose model Implementation scenarios Simulation experiments Simulation

More information

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES CASE STUDY Application of High-Assurance Network Encryption Sector: Use Case: Solution: Goverment CCTV security HD video transmission in real time Layer

More information

SOLUTION BRIEF Enterprise WAN Agility, Simplicity and Performance with Software-Defined WAN

SOLUTION BRIEF Enterprise WAN Agility, Simplicity and Performance with Software-Defined WAN S O L U T I O N O V E R V I E W SOLUTION BRIEF Enterprise WAN Agility, Simplicity and Performance with Software-Defined WAN Today s branch office users are consuming more wide area network (WAN) bandwidth

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN Issue 1.1 Date 2014-03-14 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or

More information

Datasheet. Millimeter-Wave Radio (MMW) Security of MMW. Overview

Datasheet. Millimeter-Wave Radio (MMW) Security of MMW. Overview Datasheet Millimeter-Wave Radio (MMW) Security of MMW Overview About Wireless Excellence Founded in 1996 and with headquarters in Oxford UK, Wireless Excellence Limited is a leading designer and supplier

More information

SOFTWARE-DEFINED NETWORKING WHAT IT IS, AND WHY IT MATTERS

SOFTWARE-DEFINED NETWORKING WHAT IT IS, AND WHY IT MATTERS SOFTWARE-DEFINED NETWORKING WHAT IT IS, AND WHY IT MATTERS When discussing business networking and communications solutions, the conversation seems invariably to revolve around cloud services, and more

More information

Broadband Internet Access Disclosure

Broadband Internet Access Disclosure Broadband Internet Access Disclosure This document provides information about the network practices, performance characteristics, and commercial terms applicable broadband Internet access services provided

More information

By VPNet Technologies. What s a VPN Anyway? A Virtual Private Networking Primer

By VPNet Technologies. What s a VPN Anyway? A Virtual Private Networking Primer By VPNet Technologies What s a VPN Anyway? A Virtual Private Networking Primer What s a VPN Anyway? What s a VPN Anyway? or The Cloud s Silver Lining Is Your Net 1998 VPNet Technologies Inc. All rights

More information

Network Security Policy

Network Security Policy Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

The Solution Requirements and considerations

The Solution Requirements and considerations Annex A TERMS OF REFERENCE Virtual Private Network (VPN) tunnel installation and Very Small Aperture Terminal (VSAT) internet connectivity for Migration Information and Data Analysis Systems (MIDAS) at

More information

Corporate Private Networks Applications

Corporate Private Networks Applications Corporate communication networks are critical in ensuring day-to-day business operations flow smoothly. With deficiencies in telephone networks and terrestrial infrastructure in developing regions, a modern,

More information

Network Connectivity and Mobility Part 2

Network Connectivity and Mobility Part 2 Network Connectivity and Mobility Part 2 BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1.

More information

The Benefits of Wireless Infrastructure Management in the Cloud

The Benefits of Wireless Infrastructure Management in the Cloud WHITE PAPER The Benefits of Wireless Infrastructure Management in the Cloud High Performance Wireless Networks The Benefits of Wireless Infrastructure Management in the Cloud How the cloud maximizes IT

More information

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 A system or combination of systems that enforces a boundary between two or more networks - NCSA

More information

How Cisco Deploys Video Conferencing for Employee Collaboration

How Cisco Deploys Video Conferencing for Employee Collaboration How Cisco Deploys Video Conferencing for Employee Collaboration Cisco Unified Video Advantage brings video telephony to Cisco Unified IP phones. Cisco IT Case Study / Video / : This case study describes

More information

ENSC 427: COMMUNICATION NETWORKS

ENSC 427: COMMUNICATION NETWORKS ENSC 427: COMMUNICATION NETWORKS Simulation of ZigBee Wireless Sensor Networks Final Report Spring 2012 Mehran Ferdowsi Mfa6@sfu.ca Table of Contents 1. Introduction...2 2. Project Scope...2 3. ZigBee

More information

The high-speed services required for these customers and environments include:

The high-speed services required for these customers and environments include: Chapter 7 NETWORK MODELS THE NEED FOR MULTISERVICES technology provides a cost-effective means for service users to gain access from the residence or office to very high-speed network services. transmission

More information

IPv6 Deployment Overview & Policy Update

IPv6 Deployment Overview & Policy Update IPv6 Deployment Overview & Policy Update Takuya MIYOSHI Internet Policy Office Ministry of Internal Affairs and Communications, Japan 24 th February, 2005 History and Acceleration of Japan s IT Strategy

More information

Exam: : VPN/Security. Ver :

Exam: : VPN/Security. Ver : Exam: Title : VPN/Security Ver : 03.20.04 QUESTION 1 A customer needs to connect smaller branch office locations to its central site and desires a more which solution should you recommend? A. V3PN solution

More information

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information