ERCOT Wide Area Network Overview & EDS Communication Standard John Fisher ERCOT Network Manager.

Slides:



Advertisements
Similar presentations
By Taylor and Ed. Uses standard voice telephone lines Uses a modem to place a telephone call to another modem at a remote site Two major disadvantages.
Advertisements

IT’S HERE Bandwidth Technologies. Agenda Technologies for Bandwidth –Single Location DSL/Cable T1/Bonded T1 DS3/OC-N Ethernet Over Copper (EoC, EoFM)
Giảng viên : Ts. Lê Anh Ngọc Học viên: Trịnh Hồng Điệp Nguyễn Minh H ư ớng 1.
Not to be distributed or reproduced by anyone other than Qwest entities. Copyright © 2010 Qwest. All Rights Reserved. Government Services TIC from an Industry.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Introducing VPNs.
Presented by:- XHITESH KUMAR THAKUR ROSHAN LAL SAHU BRAJENDRA KUMAR SINGH HARSHIT BORWANKAR SHREEKAR WAGHELA.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
Virtual Private Network (VPN) Its Place in a Lottery’s Communication Portfolio Leslie Vang, Deputy Director IT, SCEL.
1 Computer Networks & The Internet Lecture 3 Imran Ahmed University of Management & Technology.
Chapter 8 Wide Area Networks. Announcements and Outline Announcements Outline 8.1 Introduction 8.2 Services 8.21 Circuit-Switched Networks 8.22 Dedicated-Circuit.
Chapter 10 Wide Area Networks. Contents The need for Wide area networks (WANs) Point-to-point approaches Statistical multiplexing, TDM, FDM approaches.
Copyright © 2015 John, Wiley & Sons, Inc. All rights reserved. 9-1 FitzGerald ● Dennis ● Durcikova Prepared by Taylor M. Wells: College of Business Administration,
Network/Technology Infrastructure Plan Section 5 – 6 – 7 As prepared for the TUSD Governing Board Summer 2007 John Bratcher Network Security Systems Analyst.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
LESSON 6 – MAKING WAN CONNECTIONS. Wide Area Network (WAN) needs Wide Area Network (WAN) connections OVERVIEW.
Terri Lahey LCLS Facility Advisory Committee 20 April 2006 LCLS Network Security Terri Lahey.
Lesson 14 – DESIGNING A NETWORK. Assessing Network needs Meeting Network needs OVERVIEW.
Wireless Ethernet Backhaul : A Carrier’s Perspective
Bert Lathrop Director, IT Infrastructure 10/6/2011 WAN Management Fee - Billing Changes.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
333: DISCUSS THE FUNDAMENTALS OF NETWORKING.  1. Discuss networking concepts (20 hrs)  2. Discuss hardware & software requirement to setup a Local Area.
Toolbox Helping You Define Value and Close Business The Business Value of Ethernet Services.
Leased Line. Introduction A leased line is a service contract between a provider and a customer, whereby the provider agrees to deliver a symmetric telecommunications.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
Networking Types of Internet Connection
IT Business Continuity Briefing March 3,  Incident Overview  Improving the power posture of the Primary Data Center  STAGEnet Redundancy  Telephone.
Application Overview. Network Zone User Zone – Client Layers.
Sales Education and Performance Consulting Presents Private Network Transport (PNT) and Class of Service (CoS)
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Technical Details – SAN PHARMA SFA. Front End / Back End Details  ASP  ASP.net  XML  JAVA Script  DHTML  MS SQL SERVER.
Some Basic Networking Concepts: LANs, WANs, Switching, and Multiplexing Carey Williamson Department of Computer Science University of Calgary.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Bridging the West to East April 2010 Dumitru VLAD, GM Commercial Affairs Data Division.
Outlines Received due 13 March %. Homework n Review for Midterm (1 March 2000) n Research Paper n Readings [9] “MPLS: Special Delivery” [10] “Diversifying.
Some Networking Basics: LANs, WANs, Switching, and Multiplexing Carey Williamson Department of Computer Science University of Calgary.
Voice Over Internet Protocol (VoIP). Basic Components of a Telephony Network.
Cdma CDMA SYSTEMSERICSSON PROPRIETARYExecutive Briefing on 3G Services Supported today with cdmaOne and tomorrow with cdma2000 Gwenn Larsson Director Strategic.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
MP Failover DNS Option 1 for API Failover The same DNS structure that allows ERCOT to fail over services between sites can also be used to allow MPs to.
GUIDED BY – MR. L. K. VARMA SIR PRESENTED BY- AJAY KUMAR SONI MARTIN XESS ASHISH NIRMALKAR PUSHKAR BHARTIYA GYAN PRAKASH PRESENTED BY- AJAY KUMAR SONI.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Elijah Suko & Jamie Kuolt. The Connected World  Networks Local Area Network (LAN) Wide Area Network (WAN) Metropolitan Area Network (MAN)
– 1Texas Nodal Texas Nodal ICCP Business Case By Jeyant Tamby, ERCOT.
Use Cases for High Bandwidth Query and Control of Core Networks Greg Bernstein, Grotto Networking Young Lee, Huawei draft-bernstein-alto-large-bandwidth-cases-00.txt.
LiveOps UK&EU Infrastructure Review. Introductions Review overall call flow – How does a call and associated data flow through various LiveOps platform.
Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—5-1 Customer-to-Provider Connectivity with BGP Understanding Customer-to-Provider Connectivity.
MV90 IP Data Transport ERCOT Recommendation John Fisher & Jeff Maddox.
Topic 6, Lesson 3: The Internet Computer Communications and Networking.
Building Corporate Data Networks – A Case Study
Lead from the front Texas Nodal 1 Integrated ERCOT Readiness and Transition (IRT) TPTF – December 4 th, 2006 ERCOT Qualification.
Chapter 8 Wide Area Networks. Announcements and Outline Announcements Outline 8.1 Introduction 8.2 Services 8.21 Circuit-Switched Networks 8.22 Dedicated-Circuit.
1 TDTWG Report to RMS SCR Addressing ERCOT System Outages Tuesday, May 10.
FatPipe Networks invented the concept of router clustering to make branch office connectivity reliable without BGP Programming FatPipe Networks provides.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
© 2001 Caspian Networks, Inc. CONFIDENTIAL AND PROPRIETARY INFORMATION Internet Intelligence and Traffic Growth Lawrence G. Roberts Chairman & CTO Caspian.
CCI BUSINESS James W. Yates, MBA Regional Solutions Engineering Manager.
PRS Workshop- NPRR755/NOGRR154 WAN communications of Critical Market Data and Agency-Only QSE Feb 29, 2016.
SCALABILITY AND SECURITY Presentation. 01 Scalability.
Cisco Discovery 3 Chapter 1 Networking in the Enterprise JEOPARDY.
AT&T Internet Services Let Sarco Communications Company’s 35+ years of telecommunication experience show you how to optimize productivity while utilizing.
And Presents Spring Forum 2002.
Lab A: Planning an Installation
Wide Area Network.
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
IS4680 Security Auditing for Compliance
Intro to Data & Internet
Presentation transcript:

ERCOT Wide Area Network Overview & EDS Communication Standard John Fisher ERCOT Network Manager

2 ERCOT WAN The ERCOT WAN consists of 2 separate Wide Area Networks –IP WAN –Voice and RTU WAN (aka “Point-to-Point network) IP WAN (MPLS) –MPLS on Sprint network –Each MP is allocated 1.544Mbps bandwidth –ERCOT “core” is allocated 9Mbps per site (Austin and Taylor) –Majority of traffic is XML, HTTPS, and ICCP Voice and RTU WAN (Point-to-Point) –Dedicated T1s through AT&T DACS network –Provides connectivity for voice systems (turret, hotline, OPX) –Provides connectivity for RTUs –Provides redundant data connection for IP WAN

3 IP Data WAN Overview

4 Voice & RTU (Point-to-Point) WAN Overview

5 ERCOT Internet Presence Highly secure –Encrypted data communications –Identity validation via digital certificates –Layered security architecture –Protected DMZ Highly reliable & highly redundant –Multiple layers of hardware redundancy –Adequate bandwidth –Multiple DNS servers –Redundant, diverse, carrier connections –Private IP space

6 Internet Design Overview

7 ICCP ICCP Stats (An example of a Market Participant) Currently runs at approx 128Kbps Nodal testing will increase their ICCP load by 100% Anticipate roughly 256Kbps of ICCP load. This is 25% of circuit capacity Capacity Calculation Total reliable* capacity is 1024Kbps –Equation as follows Point-to-Point T1 capacity = 24DS0 x 64Kbps each = 1,536Kbps Must reserve 8 DS0 (512Kbps) channels for voice 1,536 – 512 = 1024 * Reliable capacity is defined by amount of available bandwidth on Point-to-Point WAN. The MPLS network is capable of 1.544Mbps; however, we can only guarantee reliability of up to 1024Kbps due to requirement of dynamic failover to Point-to-Point network in the event of an MPLS network failure.

8 Approach to EDS We do not want to impact Zonal production traffic with Nodal test traffic. All non-ICCP EDS traffic will transit the Internet. Once trending and analysis are complete, a determination will be made regarding availability of web services over the WAN. We hope to have statistical analysis complete by March The expected outcome of the analysis is that most, if not all, non-grid critical traffic will be moved to the Internet.