The Future of GovNeTT – Where are we Heading?. GovNeTT 2.0 Current State Obscure Governance Framework Design is Difficult to Evolve to Changing Needs.

Slides:



Advertisements
Similar presentations
Chapter 3: Planning a Network Upgrade
Advertisements

Prepared By Naieem Khan & Ummiya Rahman Presentation On.
1 Chapter 11: Data Centre Administration Objectives Data Centre Structure Data Centre Structure Data Centre Administration Data Centre Administration Data.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
Introducing Campus Networks
Guide to Network Defense and Countermeasures Second Edition
Cisco Hierarchical Network Model RD-CSY /101.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
Tunis, Tunisia, 28 April 2014 Business Values of Virtualization Mounir Ferjani, Senior Product Manager, Huawei Technologies 2.
Cisco and NetApp Confidential. Distributed under non-disclosure only. Name Date FlexPod Entry-level Solution FlexPod Value, Sized Right for Smaller Workloads.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
SERVER LOAD BALANCING Presented By : Priya Palanivelu.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
SaaS, PaaS & TaaS By: Raza Usmani
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Mr. Mark Welton.  Three-tiered Architecture  Collapsed core – no distribution  Collapsed core – no distribution or access.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Current trends in data centre outsourcing
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
Networking Components
Networking Components Christopher Biles LTEC Assignment 3.
Effectively Explaining the Cloud to Your Colleagues.
Cloud Computing ITM4D - Tobago July 11 th, What is Cloud Computing? Computing Hardware and Software Delivered as-a-Service over a Network/the Internet.
Common Devices Used In Computer Networks
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Exploring the Network.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Module 4: Designing Routing and Switching Requirements.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Next Generation Network for Ohio OH 1 Ohio Digital Government Summit October 2004.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
LAN Switching and Wireless – Chapter 1
IP Network Clearinghouse Solutions ENUM IP-Enabling The Global Telephone Directory Frank Estes Vice President , ext 224
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Hierarchical Network Design – a Review 1 RD-CSY3021.
OBJECTIVE: o Describe various network topologies o Discuss the role of network devices o Understand Network Configuration Factors to deploy a new network.
Networking Components James Rouse LTEC Network Administration March 15, 2014 Assignment 3.
Illinois Century Network Illinois Broadband Opportunity Partnership – East Central Project.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNP 1 v3.0 Module 1 Overview of Scalable Internetworks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
Lecture-2: Idea of Network LAN - Local Area Network WAN - Wide Area Network.
Advanced Computer Networks Lecturer: E EE Eng. Ahmed Hemaid Office: I 114.
6.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 6: Designing.
Switched LAN Architecture
CHAPTER - 4 COMPUTER NETWORK Dr. BALAMURUGAN MUTHURAMAN
CLOUD COMPUTING WHAT IS CLOUD COMPUTING?  Cloud Computing, also known as ‘on-demand computing’, is a kind of Internet-based computing,
Kevin Harrison LTEC 4550 Assignment 3.  Ethernet Hub  An unsophisticated device that is used for connecting multiple Ethernet devices together.  Typically.
PART1: NETWORK COMPONENTS AND TRANSMISSION MEDIUM Wired and Wireless network management 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
Chapter 1 Introduction to Networking
Chapter 1: Exploring the Network
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Exploring the Functions of Networking
Planning and Troubleshooting Routing and Switching
The NPD Group - Enterprise DC Agenda
Introduction to Cloud Computing
UNM Enterprise Firewall
IT INFRASTRUCTURES Business-Driven Technologies
IS4680 Security Auditing for Compliance
Wide Area Network Fundamentals
Applying CIM to SD-WAN Weiqiang Cheng, Feng Yang(CMCC)
Presentation transcript:

The Future of GovNeTT – Where are we Heading?

GovNeTT 2.0 Current State Obscure Governance Framework Design is Difficult to Evolve to Changing Needs Difficult for some IT Managers to Enact Required Changes Site-to-Kit Lock-in – Difficult to Unbundle and Reduce Managed Costs Difficult to Expand Service Set/Increase DC Utilization Architecture not Fully Suited to Shared Environment Time Required to Fulfil Requests 2

What Are Root Causes? Two Main Categories Include Governance Framework Technology and Architecture 3

Governance Framework Need for Approved Governance Framework and Structure Shared Service Model Buy-in from Agencies Apply Common Framework for Building ICTs Security Framework for All of GoRTT ICT Initiatives 4

GovNeTT Technology From a Technology Perspective there is need for Dynamic ICTs Improved Flexibility Agility of Deployment and Access to Service Scalability Enhanced Security Modular Approach to Service Reduced Development and Operational Costs 5

Current Technology/Design – GovNeTT WAN 6

Current Technology/Design Issues Design is Difficult to Evolve to Changing Needs Inadequate Data Centre hosting facility Site-to-Kit Lock-in – Difficult to Unbundle and Reduce Managed Costs Difficult to Expand Service Set/Increase DC Utilization Architecture not Fully Suited to Shared Environment 7

Current Technology/Design Issues – GovNeTT WAN Networking:- Inefficient resource usage, route determination Complex redundancy configurations & VPN design Unnecessary hops for sub office to sub office communication between different ministries High network latencies for all central resource access 8

Current Technology/Design Issues – GovNeTT WAN Security:- Unnecessary routes in the network Increased possibility of data compromise Shared services:- Distributed caching potential for redundant cache entries in multiple locations No centralized administrative Internet resource control Unnecessary ICT investment for Internet resource control 9

Current Data Centre Layout 10

Current Technology/Design Issues – Data Centre Layout Networking:- Complex logical interconnections Difficult to include new segments Server Farm connectivity not associated with low- latency, high speed access Central switches used to connect all segments Routers terminate majority of user traffic indirectly Servers share common switch infrastructure regardless of function Remote access/extranet connectivity is complex 11

Current Technology/Design Issues – Data Centre Layout Security:- Logical segmentation not as secure as physical segmentation Limited Firewall Tiers Multiple segments interconnected to single Firewall clusters causing increased risk of unauthorized access Complex security rule base causes open rules to maintain access Firewall breach can cause multiple points of possible security breach Multi-purpose security equipment not as stable or secure as dedicated devices DMZ and other similar lower security level segments are inter-connected to common physical switches as segments with higher security levels Firewall cluster tiers are built on common technology, a breach in one Firewalled segment can allow breach in other segments using the same technology 12

Proposed High Level Services Technology/Design 13

Proposed High Level Services Demand aggregation will be used to derive: What common services are required by GoRTT What are the collated system requirements Supporting architecture: – In house? – Outsourced? – Cloud? …Hybrid Approach 14

Proposed High Level Data Centre Topology/Design 15

Proposed Data Centre Low Level Topology/Design 16

Features of Proposed Technology/Design By doing:- Direct mapping to future G-Cloud Direct mapping to shared services and collaborative environments Multivendor approach fostered by tight SLA Management Last Mile determined by Ministry (Agency deals directly with vendors based on iGovTT agreements) Full network segmentation – Infrastructure/service segmentation – Data Centre segmentation – Decoupling of Services 17

Timelines 18

Q&A 19

THANK YOU! 20