Virtual Private Network (VPN) Its Place in a Lottery’s Communication Portfolio Leslie Vang, Deputy Director IT, SCEL.

Slides:



Advertisements
Similar presentations
Chador Wangdi Page 1of15. Analog (up to 56k/ dial up access) Using a modem connected to your PC, users connect to the internet when the computer dials.
Advertisements

The Ultimate Redundancy System for Voice and Data Communications Land and Air ™
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Introducing VPNs.
CP Networking1 WAN and Internet Access. CP Networking2 Introduction What is Wide Area Networking? What is Wide Area Networking? How Internet.
A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang.
WAN Technologies Dial-up modem connections Cheap Slow
Internet Connections By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
Chapter 1: Computer Networks IB 300: Advanced Computer Sciences. Professor: Nabil Elmjati.
Remote Desktop Connection Techniques Wireless Communication Networks.
Internet: A Network of Networks. Spring 2002Computer Networks Applications Disparate Network Technologies Different goals: Speed, cost, distance; Different.
Metropolitan and Wide Area Networks Under construction…
Telecommunications and Networks Business value of networks Network components Chapter 6 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies,
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
INTERNET CONNECTIVITY Joe Muscarella Pentastar Communications.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Virtual Private Networking Karlene R. Samuels COSC513.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Chapter 6: The Internet1 The Internet Chapter 6. Chapter 6: The Internet2 Internet Technology Background Internet Infrastructure Internet Protocols, Addresses,
WANs and Remote Connectivity
Remote Networking Architectures
Types of Internet Connections
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Internet. Internet is a global network of interconnected computers over world wide web. It allows individuals to communicate with each other. History.
Data Network Connectivity 11. Objectives In this chapter, you will learn to: Explain how NICs operate List the most common types of NICs Describe the.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
Networking Technologies
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
What is broadband Multiple broadband technologies Advantages DSL and DSLAM Types of DSL transmission Services through broadband Cable Modem Internet Access.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Broadband Solutions Connecting Networks.
WAN Technologies Dial-up modem connections
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 The Internet and Its Uses Working at a Small-to-Medium Business or.
Communication Services Communication Services: –Problem: This chapter expands on topics introduced in earlier chapters related to long-distance communication.
1 Back to Slide 7. 2 Also called dial-up access, it is both economical and slow. Using a modem connected to your PC, users can connect to the Internet.
WANs and Remote Connectivity
ERCOT Wide Area Network Overview & EDS Communication Standard John Fisher ERCOT Network Manager.
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public.
ITGS Types of network.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Test #2 Topics Know the wireless propagation problems Understand what the “Golden Zone” is Understand the relationship between bandwidth and transmission.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Chapter 2 Network Topology
Networks and Protocols CE Week 5a. WAN’s and ISDN.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Essentials of Telecommunications.
Elijah Suko & Jamie Kuolt. The Connected World  Networks Local Area Network (LAN) Wide Area Network (WAN) Metropolitan Area Network (MAN)
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.
 The Analogue connection, also known as Dial-Up access, is a very slow and inexpensive type of internet connection. A dialup connection uses a modem,
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Chapter 8 Wide Area Networks. Announcements and Outline Announcements Outline 8.1 Introduction 8.2 Services 8.21 Circuit-Switched Networks 8.22 Dedicated-Circuit.
By: Chasity, Jamon, Clifton.  Computer networks have lots of pathways that send information back and forth.  Networks can even send the information.
Cisco Router Technology. Overview Topics :- Overview of cisco Overview of cisco Introduction of Router Introduction of Router How Router Works How Router.
Wireless Data Security Peter Michel CSC 8560 February 24, 2004.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Jonathan Brewer Technical Director Araneo Wireless Solutions Layer 3 Tunnels for Broadband Delivery.
Instructor Materials Chapter 1: WAN Concepts
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Chapter 1: WAN Concepts Connecting Networks
Networks Learning Outcome 1
PPPoE Internet Point to Point Protocol over Ethernet
Providing Teleworker Services
Connectivity methods. Connectivity methods Exam Answer WAN/LAN  Each office will have its own Local Area Network or LAN.  But the company also wants.
Providing Teleworker Services
Vpn’s Virtual private network is a private network that extends across a public network or internet which enables people to send and receive data across.
Intro to Data & Internet
Presentation transcript:

Virtual Private Network (VPN) Its Place in a Lottery’s Communication Portfolio Leslie Vang, Deputy Director IT, SCEL

Communication Technologies Dialup POTS DDS – Digital Data Service Dialup VPN – Virtual Private Network DSL VPN – Digital Subscriber Line DSL - Wireless Modems

Timeline

Network January 7, 2002 Total network consists of approx: >2200 dial-up 0 dedicated digital circuits 0 Dial up VPN 0 DSL VPN 0 DSL 0 Wireless

VPN Faster to install Faster line, higher bandwidth Multiple Sources in SC –Local Exchange Carrier –Internet Service Provider Inside Wiring Cost

What is a Virtual Private Network? Commercial communication network Utilizes the Internet as its backbone HW & SW create “private tunnel” Isolate our traffic from general Internet traffic through encryption Communication only between nodes in SCEL network

VPN Benefits Rapid and Easy Deployment to Retailers Secure point-to-point communication Reliable –Route diversification –Redundancy into Data Centers –Terminals connect through Multiple ISPs –Self Healing via lower baud rate or reconnection IP family of protocols supports other services Cost Effective, Available Statewide Virtual Private Networking

Network March 7, 2002 Total network consists of approx: 958 Dial-up POTS 842 dedicated digital circuits 1810 Dial-up VPN connections 0 DSL 3 Wireless Events VPN managed by BellSouth approximately 60% of VPN connections provided by BellSouth approximately 40% of VPN connections provided by independent LECs and ISPs.

Network Future 2003 Total network consists of approx: 279 Dial-up POTS 739 Dedicated digital circuits 1114 Dial-up and DSL VPN connections 1300 DSL connections 9 Wireless Events

SCEL Portfolio Future Track costs, problems - understand trends Implement communication with best technology fit and least cost Monitor portfolio, adjust technology as we see fit Keep on the lookout for new technologies with lower cost and low maintenance