Networks for e-Gov Projects Shatrunjay Rawat IIIT, Hyderabad.

Slides:



Advertisements
Similar presentations
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Advertisements

The Enterprise Guide to Video Conferencing Created using iThoughts [...] [...]
Business Solutions Network Security Solutions Gateway Security
Prepared By Naieem Khan & Ummiya Rahman Presentation On.
PROF. MAULIK PATEL CED, GPERI Mobile Computing Gujarat Power Engineering and Research Institute 1 Prepared By: Prof. Maulik Patel.
ONE PLANET ONE NETWORK A MILLION POSSIBILITIES Barry Joseph Director, Offer and Product Management.
Nicolas FISCHBACH Senior Manager, IP Engineering/Security - COLT Telecom - version 1.0 Voice over IP (VoIP)
Core and Access Technologies
CP Networking1 WAN and Internet Access. CP Networking2 Introduction What is Wide Area Networking? What is Wide Area Networking? How Internet.
Broad-Band Satellite Networks - The Global IT Bridge Presented by Tsoline Mikaelian Abbas Jamalipour By Abbas Jamalipour Proc. of the IEEE, Vol. 89, No.1.
Chapter 5 Networks. Learning Objectives After reading this chapter the reader should be able to: Understand the importance of networks in the field of.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
WAN Technologies Dial-up modem connections Cheap Slow
 Copyright 2005 Digital Enterprise Research Institute. All rights reserved. Semantic Web Services in the environment of Next Generation Network.
MSIT 458: Information Security & Assurance By Curtis Pethley.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
Virtual Private Networking Karlene R. Samuels COSC513.
1 Course Summary What have we learned: a huge amount! m principles m practice ….. using Internet to motivate examples.
INTRODUCTION TO COMPUTER NETWORKS Navpreet Singh Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA (Ph : ,
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Public IP Telephony Introduction to VoIP Cisco Networking Academy Program.
Networking Components Raymond C. Banks LTEC 4550 October 12, 2013.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. WAN Infrastructure  WAN Transmission Technologies  WAN Connectivity Methods 
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
LO1 Know types of Network Systems and Protocols. Wan Technologies.
Windows 7 Firewall.
Module 4: Designing Routing and Switching Requirements.
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
Network Fundamentals. Network Devices Routers (Layer 3)
N ETWORKING C OMPONENTS A-3 LTEC 4550 by Joe Garcia.
Test #2 Topics Know the wireless propagation problems Understand what the “Golden Zone” is Understand the relationship between bandwidth and transmission.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Office of Infrastructure Services Division of Communications Brad Watkins Director of Communications.
Networking Components By: Timothy O’Grady. Ethernet Hub Ethernet hubs link PC’s and peripherals and allow them to communicate over networks. Data transferring.
University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department INTRODUCTION TO COMPUTER NETWORKS Dr. Abdelhamid.
4G 발표자 : 전지훈. What is 4G? (1/3)  The next complete evolution in wireless communications  SBI2K(Systems Beyond IMT 2000)  ITU(International Telecommunication.
S4-Chapter 3 WAN Design Requirements. WAN Technologies Leased Line –PPP networks –Hub and Spoke Topologies –Backup for other links ISDN –Cost-effective.
Providing Teleworker Services
Computer networks Internet, Intranet, Extranet, Lan, Wan, characteristics and differences.
Unleashing the Power of IP Communications™ Calling Across The Boundaries Mike Burkett, VP Products September 2002.
. Large internetworks can consist of the following three distinct components:  Campus networks, which consist of locally connected users in a building.
Indian Institute of Technology Bombay 1 Abhay Karandikar Associate Professor Department of Electrical Engineering
Networking Components
Building Corporate Data Networks – A Case Study
Networks The Big Picture. Three Great Leaps of Civilization.
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Residential Solution ADSL2/2+ Router Vigor2710e series 1 WAN,4 LAN Firewall n WLAN Content Filter * TR 069 Vigor2710 series 1 WAN, 4 LAN Firewall.
Multimedia Communication Systems Techniques, Standards, and Networks Chapter 4 Distributed Multimedia Systems.
Telecommunications Essentials Chapter 9. Cost savings & revenue generation Logical rather than physical connections IPT – Telephony IPTV – Digital Television.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
WIRELESS GATEWAYS FOR HOME USE AND ENTERPRISE USE NOR HANANI BINTI SAHARUDIN TSK 1.
INTERNET PROTOCOL TELEVISION (IP-TV)
Chapter 1: Explore the Network
Providing Teleworker Services
Wide Area Network.
INTRODUCTION TO COMPUTER NETWORKS
Providing Teleworker Services
Providing Teleworker Services
Providing Teleworker Services
Presentation transcript:

Networks for e-Gov Projects Shatrunjay Rawat IIIT, Hyderabad

Design Steps Requirement Analysis Technology Options Available Constraints Making Design Choice

Requirement Analysis Purpose of the Network  Data Only  Data and Voice  Data, Voice and Video

Requirement Analysis Purpose of the Network  On-line application  Off-line application  Combination of on-line and off-line application Is work scheduling possible?

Requirement Analysis Purpose of the Network  Internal Operations  Interface with citizens For disseminating information Two way  Connecting Multiple Departments/ Institutes  Dealer Network

Requirement Analysis Network Availability  Fixed Duration Office hours  24 hours

Requirement Analysis User Information  Number of Users  Concurrency  Peak load, average Load  User side infrastructure  User skills

Requirement Analysis Bandwidth Requirements  Known  Approximately known  Unknown, Open ended  Symmetric OR Asymmetric traffic?

Requirement Analysis QoS Requirements  Up-time  Disaster State  Delay, Jitter  Call acceptance/rejection rate Can user wait? How long?

Requirement Analysis User Mobility  Fixed  Mobile within a known boundary  Mobile within populated area  Absolute mobility – anywhere on earth  Or beyond earth!!

Technologies Available Connectivity - LAN  Ethernet  Frame Relay  ATM  WiFi  L2, L3 Switching

Technologies Available Connectivity - WAN  PSTN, ISDN, Wired Broadband  Wireless Broadband - WiMax  2G, GPRS, SMS, MMS  Fixed Leased Lines  MPLS  Satellite Communication VSAT, INMARSAT, Iridium

Technologies Available Security  Firewall Packet Filtering, Stateful, Application Proxy Hardware, Software  IDS, IPS  VPN  UTM  Content Screening Gateways Virus, Spyware, User Data

Technologies Available Security  Authentication Open LDAP, Active Directory, etc  NAC  VLAN  Cryptography PKI

Technologies Available Protocols  IPv4, IPv6  TCP, UDP  Unicast, Multicast  IPSec, SSL

Constraints Budget Implementation timelines Organisational capacity Institutional Guidelines  Procurement Manual, etc Legal Requirements  Taxation System, Equal Opportunity, etc International Treaties – WTO, etc

Few Example Network APSWAN INFINET Sardar Sarovar Automation Stock Exchange Indian Railways Airport Authority of India Load Dispatch System India Post