The Operator Neutral Access At KistaIP. KistaIP ? Is a student dorm with 144 apartments.

Slides:



Advertisements
Similar presentations
Virtual LANs.
Advertisements

1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
1 Fall 2005 Layer 3 Switches and VLANs Qutaibah Malluhi CSE Department Qatar University.
Hardware Firewall Feature © N. Ganesan, Ph.D.. Chapter Objectives Show the configuration of a hardware firewall such as Dlink DI 604 Illustrate the sharing.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Mobile Computing and Security Authenticated Network Access (ANA) Jon Peters Associate Director Dave Packham Manager of Network Engineering NetCom University.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
NETWORKING COMPONENTS La’Trena Barrett CECS
VLANs.ppt CCNA Exploration Semester 3 Chapter 3
TOSIBOX LOCK security options 1 1.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Networking Components
OASIS V2+ Next Generation Open Access Server CSD 2006 / Team 12.
Voice VLANs Lecture 7 VLANs.ppt 21/04/ Apr-17
Chapter Overview Network Communications.
CSD 2006 / TEAM 12 Final presentation 29 th May 2006.
Virtual LAN Design Switches also have enabled the creation of Virtual LANs (VLANs). VLANs provide greater opportunities to manage the flow of traffic on.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Altai Certification Training Backend Network Planning
Common Devices Used In Computer Networks
– Chapter 5 – Secure LAN Switching
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Networks QUME 185 Introduction to Computer Applications.
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
Assignment 3: Networking Components LTEC 4550 Jose L Ortiz Jr.
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
Author: Bill Buchanan. 1. Broadcast: What is the MAC address of this network address? 2. Requested host: All the hosts read the broadcast and checks.
DSL-520B. What is a DSL-520B -ADSL2+ MODEM ROUTER -1 RJ-11 ADSL port, 1 RJ-45 10/100BASE-TX Ethernet LAN port with auto MDI/MDIX -Factory reset button.
Intro to Switching Lecture # 3 Hassan Shuja 03/14/2006.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 8 Virtual LANs Cisco Networking Academy.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
Networking Material taken mainly from HowStuffWorks.com.
CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler.
1 VLANs Relates to Lab 6. Short module on basics of VLAN switching.
TOPIC 1.3 INTRODUCTION TO NETWORKING. Router – A netwok interconnection device & associated software that links two networks. The networks being linked.
1 Large-scale (Campus) Lan design (Part II)  VLANs  Hierarchical LAN design.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
Networks The Big Picture. Three Great Leaps of Civilization.
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
Serial Server Configuration Peter Szyszko. Hardware Configuration  Unit has to be connected to network and powered.  Computer has to be connected to.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
Network Overview. Protocol Protocol (network protocols) - a special set of rules that define communication between two or more devices on a network.
Andre’s VLAN Andre’s VLAN Nykoya’s VLAN Nykoya’s VLAN Patrick’s VLAN Patrick’s VLAN.
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Chapter 8 – Virtual LANs Virtual LANs VLAN Concepts VLAN Configuration.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 VLANs.
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
Virtual Private Networks
Large-scale (Campus) Lan design (Part II)
Wireless Modes.
Welcome To : Group 1 VC Presentation
2018 Real CompTIA N Exam Questions Killtest
PPPoE Internet Point to Point Protocol over Ethernet
Concept of VLAN (Virtual LAN) and Benefits
CCNA 3 v3 JEOPARDY Module 8 CCNA3 v3 Module 8 K. Martin.
CCNA 3 v3 JEOPARDY Module 8 CCNA3 v3 Module 8 K. Martin.
Network Models, Hardware, Protocols and number systems
Firewalls Routers, Switches, Hubs VPNs
Computer Networks Protocols
Presentation transcript:

The Operator Neutral Access At KistaIP

KistaIP ? Is a student dorm with 144 apartments.

KistaIP ? Is a student dorm with 144 apartments. Each apartment have a fiber connection to the router room at KistaIP.

KistaIP ? Is a student dorm with 144 apartments. Each apartment have a fiber connection to the router room at KistaIP. The student obtains a fiber-to-Ethernet converter which is used to connect the fiber to a computer.

The Network Infrastructure Each room is connected by a multimode fiber to one of the Dynarc 1124 routers.

The Network Infrastructure Each room is connected by a multimode fiber to one of the Dynarc 1124 routers. There are 6 Dynarc 1124 routers with 24 ports providing 6*24=144 connections.

The Network Infrastructure Each room is connected by a multimode fiber to one of the Dynarc 1124 routers. There are 6 Dynarc 1124 routers with 24 ports providing 6*24=144 connections. The 6 routers are connected to the Dynarc 5116 router at Electrum by a singlemode fiber.

The Network Infrastructure Each room is connected by a multimode fiber to one of the Dynarc 1124 routers. There are 6 Dynarc 1124 routers with 24 ports providing 6*24=144 connections. The 6 routers are connected to the Dynarc 5116 router at Electrum by a singlemode fiber. The 7 routers build together a dual DTM ( Dynamic synchronous Transfer Mode) ring.

The Network Infrastructure

Problems & solutions? How to provide operator neutral access.

Problems & solutions? How to provide operator neutral access. Introduce the use of VLANs.

Problems & solutions? How to provide operator neutral access. To provide an easy way to change between the providers. Introduce the use of VLANs.

Problems & solutions? How to provide operator neutral access. To provide an easy way to change between the providers. Introduce the use of VLANs. Provide server side software.

Problems & solutions? How to provide operator neutral access. To provide an easy way to change between the providers. Software free from the client side. Introduce the use of VLANs. Provide server side software.

Problems & solutions? How to provide operator neutral access. To provide an easy way to change between the providers. Software free from the client side. Introduce the use of VLANs. Provide server side software. Use a form of web based login and control

VLAN ? Virtual Local Area Network (VLAN).

VLAN ? Virtual Local Area Network (VLAN). Devices on different LANs that joins the same VLAN have the ability to communicate with each other as if they were at the same broadcast domain.

VLAN ? Virtual Local Area Network (VLAN). Devices on different LANs that joins the same VLAN have the ability to communicate with each other as if they were at the same broadcast domain. Can be used to divide a LAN to different small LANs (VLANs), limiting the broadcast traffic and making the network more manageable.

Method Each provider belongs to a VLAN.

Method Each provider belongs to a VLAN. Users connect to a “VLAN changer” to switch between ISPs.

Method Each provider belongs to a VLAN. Users connect to a “VLAN changer” to switch between ISPs. A server side software called vpch is used to change VLANs on each port on the Dynarc 1124 routers.

Method Each provider belongs to a VLAN. Users connect to a “VLAN changer” to switch between ISPs. A server side software called vpch is used to change VLANs on each port on the Dynarc 1124 routers. The “VLAN changer” provides vpch with the information necessary.

Method Each provider belongs to a VLAN. Users connect to a “VLAN changer” to switch between ISPs. A server side software called vpch is used to change VLANs on each port on the Dynarc 1124 routers. The “VLAN changer” provides vpch with the information necessary. The oasis software is used to authenticate and open the firewall on the providers side.

The main components of the KistaIP neutral network Auth and VLAN changer. DHCP and Auth machine on the providers side

Auth and VLAN changer DHCP to provide a private network (VLAN 100) for the students where they are able to use to change ISPs.

Auth and VLAN changer DHCP to provide a private network (VLAN 100) for the students where they are able to use to change ISPs. A database to provide the vpch with information on each user, as well as for security reasons. [Password, lgh, building, room, MAC, router (IP), interface, oldvlan]

Auth and VLAN changer DHCP to provide a private network (VLAN 100) for the students where they are able to use to change ISPs. A database to provide the vpch with information on each user, as well as for security reasons. [Password, lgh, building, room, MAC, router (IP), interface, oldvlan] A second database with information about the ISPs. [isp (name), vlan, ip (redirection page)]

Auth and VLAN changer DHCP to provide a private network (VLAN 100) for the students where they are able to use to change ISPs. A database to provide the vpch with information on each user, as well as for security reasons. [Password, lgh, building, room, MAC, router (IP), interface, oldvlan] A second database with information about the ISPs. [isp (name), vlan, ip (redirection page)] The vpch application, which connects to the routers and changes the VLAN on users port.

Auth and VLAN changer DHCP to provide a private network (VLAN 100) for the students where they are able to use to change ISPs. A database to provide the vpch with information on each user, as well as for security reasons. [Password, lgh, building, room, MAC, router (IP), interface, oldvlan] A second database with information about the ISPs. [isp (name), vlan, ip (redirection page)] The vpch application, which connects to the routers and changes the VLAN on users port. An Authentication mechanism.

Auth and VLAN changer DHCP to provide a private network (VLAN 100) for the students where they are able to use to change ISPs. A database to provide the vpch with information on each user, as well as for security reasons. [Password, lgh, building, room, MAC, router (IP), interface, oldvlan] A second database with information about the ISPs. [isp (name), vlan, ip (redirection page)] The vpch application, which connects to the routers and changes the VLAN on users port. An Authentication mechanism. A registration form to register new users.

ISP side configuration An authentication protocol (e.g. kerberos, radius).

ISP side configuration An authentication protocol (e.g. kerberos, radius). Web based authentication forms.

ISP side configuration An authentication protocol (e.g. kerberos, radius). Web based authentication forms. The Oasis software package: Provides a mechanism for authentication. Opens and closes firewall rules. Ability to detect inactive users. Support many kinds of authentication protocols by using PAM (Pluggable Authentication Modules).