Cable Last Update 2010.01.16 1.7.0 Copyright 2000-2010 Kenneth M. Chipps Ph.D. www.chipps.com 1.

Slides:



Advertisements
Similar presentations
MAN Design Last Update Copyright Kenneth M. Chipps PhD 1.
Advertisements

PPPoE Last Update Copyright Kenneth M. Chipps Ph.D. 1.
SAN Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Demarc Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Copyright Kenneth M. Chipps Ph.D. NETW-250 The VOIP Concept Last Update
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
What is a Network Last Update Copyright Kenneth M. Chipps Ph.D.
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
Copyright Kenneth M. Chipps Ph.D. How to Use SNMP to Collect Network Data Last Update
Copyright Kenneth M. Chipps Ph.D. 1 VPN Last Update
Capturing Wireless Frames With A NIC Last Update Copyright 2012 Kenneth M. Chipps Ph.D.
SIP Trunking Last Update Copyright Kenneth M. Chipps Ph.D. 1.
How to Build a CAN Last Update Copyright Kenneth M. Chipps PhD 1.
FTTP Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
Analog Modem Last Update Copyright Kenneth M. Chipps Ph.D. 1.
DSL Modem Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
Diagram Your Network Last Update Copyright Kenneth M. Chipps PhD 1.
EWAN Equipment Last Update Copyright 2010 Kenneth M. Chipps Ph.D. 1.
CAN Design Last Update Copyright Kenneth M. Chipps PhD 1.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
The Relationship of the Protocol Stack to the Operating System Last Update Copyright Kenneth M. Chipps Ph.D.
Slow Web Site Problem Analysis Last Update Copyright 2013 Kenneth M. Chipps Ph.D. 1.
Linux Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Copyright 2014 Kenneth M. Chipps Ph.D. The Cloud Last Update
Data Storage Methods Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Communications and Networks Chapter 9. CE06_PP09-2 Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution, and communication systems.
Citrix Virtualization Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
Powerline Distribution Last Update Copyright Kenneth M. Chipps Ph.D. 1.
NAS Last Update Copyright Kenneth N. Chipps Ph.D. 1.
What Are Protocols Last Update Copyright Kenneth M. Chipps Ph.D.
Hosted Virtualization Lab Last Update Copyright Kenneth M. Chipps Ph.D.
Packet Over SONET Interface Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
Voice Design Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
Example of a WAN Last Update Copyright 2009 Kenneth M. Chipps Ph.D.
Route Redistribution Last Update Copyright 2012 Kenneth M. Chipps Ph.D.
Addressing Design Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Carrier Ethernet Last Update Copyright Kenneth M. Chipps Ph.D. 1.
USRxx8011: Wireless Cable and DSL Router. 11 Mbps Wireless Networking Products USR 11Mbps Wireless PCI Card USR 11Mbps Wireless PCMCIA Card USR 11Mbps.
Disk Interfaces Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Add/Drop Multiplexer Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Free Space Optics Equipment Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
Copyright Kenneth M. Chipps Ph.D. Ethernet Frame Format Last Update
VLANs Last Update Copyright Kenneth M. Chipps Ph.D.
IAD Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Dark Fiber Last Update Copyright Kenneth M. Chipps Ph.D. 1.
SMDS Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Copyright 2009 Kenneth M. Chipps Ph.D. Addressing in Networks Last Update
X.25 Last Update Copyright Kenneth M. Chipps Ph.D. 1.
FDDI Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Oracle Virtualization Last Update Copyright 2012 Kenneth M. Chipps Ph.D.
DDS Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Packet Over SONET Last Update Copyright Kenneth M. Chipps Ph.D. 1.
COMPUTER NETWORKING 2 LECTURE 5: CABLE MODEMS Cable Modems.
Example of a LAN Last Update Copyright 2009 Kenneth M. Chipps Ph.D.
How to Build a LAN Last Update Copyright 2007 Kenneth M. Chipps PhD 1.
NETW-250 Key Systems Last Update
Copyright Kenneth M. Chipps Ph.D.
Radio Frequency Equipment
Introduction to Computers
Copyright 2008 Kenneth M. Chipps Ph.D.
Copyright Kenneth M. Chipps Ph.D.
Which Method Should I Select To Connect Point A to Point B
Example of a MAN Last Update
Copyright Kenneth M. Chipps Ph.D.
Example of a CAN Last Update
NAT Configuration For ZyXEL ADSL Wireless Router
White Papers Last Update
NETW-250 Avaya Voice Solutions Last Update
Presentation transcript:

Cable Last Update Copyright Kenneth M. Chipps Ph.D. 1

Objectives of This Section Learn –How the cable TV system can be used to access a corporate network Copyright Kenneth M. Chipps Ph.D. 2

Context Layer1 Network TypeWAN Copyright Kenneth M. Chipps Ph.D. 3

Layers As a layer 1 technology a Cable data line requires something at layers 2 through 7 in order to operate Typically this is –Layer 2 PPPoE –Layer 3 through 7 TCP/IP and a VPN Copyright Kenneth M. Chipps Ph.D. 4

Current Use Current cable systems can provide all aspects of connectivity to a business including phone service, Internet access, and TV Keep in mind that this is not a dedicated data line In order to connect to another site the traffic will at some point have to cross the Internet Copyright Kenneth M. Chipps Ph.D. 5

Speeds Speeds on current cable systems are fast enough to support a large number of users For example Comcast states their business class connection has 50 Mbps down and 10 Mbps up Copyright Kenneth M. Chipps Ph.D. 6

Setup One of the nice things about this technology from the standpoint of the WAN manager is that there is nothing that must be done on the customer end to setup this kind of data line Just call the provider Copyright Kenneth M. Chipps Ph.D. 7

Security As a shared media security is a problem for cable systems Most systems use DOCSIS to provide some security As an always on media the site must be protected just like any other site This requires a firewall running on a single machine or a small firewall to protect the site Copyright Kenneth M. Chipps Ph.D. 8

Security A better solution is to deploy these along with a VPN solution Copyright Kenneth M. Chipps Ph.D. 9