ECEN5553 Telecom SystemsDr. George Scheets Week #5
Read[9a] "The Cognitive Net is Coming"[8b] "How Can the Internet Have Too Many Routes and Not Enough
Addresses?"[10a] "Cybercrime: Dissecting the State of Underground Enterprise"[10b] "A Call to Cyber Arms"[11a] "The Complete Story of Phish"[11b] "Target Breach Happened Because of a Basic
Network Segmentation Error"[11c] "Sony Hack Dubbed 'Unparalleled' Crime"
Exam #1 Lecture 15, 21 September (Live)No later than 28 September (Remote DL)
Outline 7 October 2015, Lecture 22 (Live)No later than 14 October (Remote DL)
ECEN5553 Telecom SystemsDr. George Scheets Week #5
Read[9a] "The Cognitive Net is Coming"[8b] "How Can the Internet Have Too Many Routes and Not Enough
Addresses?"[10a] "Cybercrime: Dissecting the State of Underground Enterprise"[10b] "A Call to Cyber Arms"[11a] "The Complete Story of Phish"[11b] "Target Breach Happened Because of a Basic
Network Segmentation Error"[11c] "Sony Hack Dubbed 'Unparalleled' Crime"
Exam #1 Lecture 15, 21 September (Live)No later than 28 September (Remote DL)
Outline 7 October 2015, Lecture 22 (Live)No later than 14 October (Remote DL)
OutlinesReceived
due 7 October (local)14 October (remote)
OutlinesReceived
due 7 October (local)14 October (remote)
12 %
Exam #1 (90 points)Exam #1 (90 points) Friday, 21 September (Local)Friday, 21 September (Local)
Remote Distant Learners, no later than 28 SeptemberRemote Distant Learners, no later than 28 September Work 3 of 4 pagesWork 3 of 4 pages Closed Book & NotesClosed Book & Notes Calculators & phones are NOT allowedCalculators & phones are NOT allowed
...Set up numerical problem for full credit...Set up numerical problem for full credit Most equations are provided (on 5th page)Most equations are provided (on 5th page) Approximately 40% of upcoming exam will be lifted from the Approximately 40% of upcoming exam will be lifted from the
Fall 2014 Exam #1Fall 2014 Exam #1 AnythingAnything in the notes, on Power Point, or in reading in the notes, on Power Point, or in reading
assignments is fair gameassignments is fair game
On Short Answer or Essay QuestionsOn Short Answer or Essay Questions Answer the Question!Answer the Question! Memory Dump Memory Dump in the space providedin the space provided
Knowledgeable individual can write moreKnowledgeable individual can write more Grader will look for "Power Point bullets"Grader will look for "Power Point bullets" Same remarks as instructor's typically Same remarks as instructor's typically notnot required required
To get "A" or "B", To get "A" or "B", instructor needs to walk away with impression instructor needs to walk away with impression you could've said moreyou could've said more Got space? Anything else pertinent to add?Got space? Anything else pertinent to add? It is NOT necessary to write small or fill up allotted space to get a good It is NOT necessary to write small or fill up allotted space to get a good
score!score! Lost points? No comments? → Insufficient info providedLost points? No comments? → Insufficient info provided Rule of Thumb: "X" point question needs Rule of Thumb: "X" point question needs >> "X" facts "X" facts
Wireshark Packet CaptureWireshark Packet Capture
This interaction startedwith a click on a Firefox bookmark to a distance calculator from a This interaction startedwith a click on a Firefox bookmark to a distance calculator from a computer in Engineering South at OSU Stillwater. Firefox then triggers a query to an OSU computer in Engineering South at OSU Stillwater. Firefox then triggers a query to an OSU Domain Name Server asking for the IPv4 address of Domain Name Server asking for the IPv4 address of www.indo.comwww.indo.com. This is next followed by . This is next followed by a TCP 3 way handshake to open logical connections, an HTTP request to download the a TCP 3 way handshake to open logical connections, an HTTP request to download the distance calculator page, and the beginning of the file transfer.distance calculator page, and the beginning of the file transfer.
ISO OSI Seven Layer ModelISO OSI Seven Layer Model
Layer 7 ApplicationLayer 7 Application Layer 6 PresentationLayer 6 Presentation Windows API Windows API Layer 5 Session Layer 5 Session Windows Windows TCPTCP Layer 4 TransportLayer 4 Transport Windows Windows TCPTCP Layer 3 Network Layer 3 Network Windows IPWindows IP Layer 2 Data LinkLayer 2 Data Link PC NICPC NIC Layer 1 Physical Layer 1 Physical PC NICPC NIC
MSS = 1460 B = Size of Layer 6 & 7 info per packet
EthernetPayload = 1500 B
TCP Window Size (Layer 4) Effects End-to-End Throughput
TCP Window Size (Layer 4) Effects End-to-End Throughput
SupposeSuppose Window Size (set by PC) = 64 KBWindow Size (set by PC) = 64 KB
Microsoft Windows XP Microsoft Windows XP
Maximum Segment Size = 1 KBMaximum Segment Size = 1 KB Server can send Server can send << 64 unACK'd packets 64 unACK'd packets
Server PC
3,000 Km
Throughput on 64 Kbps LineThroughput on 64 Kbps Line
Server PC3,000 Km, 64 Kbps line
NPD = Prop Delay / Packet inject timeNPD = Prop Delay / Packet inject time Prop Delay = distance / EM energy speedProp Delay = distance / EM energy speed
= 3,000,000 m / 200,000,000 m/sec = 3,000,000 m / 200,000,000 m/sec = 0.015 seconds = 0.015 seconds
Packet inject time = 8,376 bits / 64 Kbits/secPacket inject time = 8,376 bits / 64 Kbits/sec = 0.1309 seconds (7B PPP, 20B IPv4, 20B TCP) = 0.1309 seconds (7B PPP, 20B IPv4, 20B TCP)
NPD = 0.015 / 0.1309 = 0.1146NPD = 0.015 / 0.1309 = 0.1146 Front end of packet arrives at far side prior to back end being transmitted.Front end of packet arrives at far side prior to back end being transmitted.
Packet #1
Throughput on 64 Kbps LineThroughput on 64 Kbps Line
Server PC
3,000 Km, 64 Kbps line
At this instant in time...At this instant in time... 2nd unACK'd packet is being transmitted2nd unACK'd packet is being transmitted ACK for #1 enroute back to serverACK for #1 enroute back to server
TCP+IP+Layer 2 TCP+IP+Layer 2 → 47 bytes if PPP→ 47 bytes if PPP
When ACK#1 arrives at server, When ACK#1 arrives at server, only packet #2 is unacknowledged.only packet #2 is unacknowledged.
Will 64 packet unACK'd limit be reached?Will 64 packet unACK'd limit be reached? No. At most, 1 packet likely unACK'd.No. At most, 1 packet likely unACK'd.
Packet #2 #1
#1 ACK
Throughput on 45 Mbps LineThroughput on 45 Mbps Line
Server PC3,000 Km, 45 Mbps line
NPD = Prop Delay / Packet inject timeNPD = Prop Delay / Packet inject time Prop Delay = distance / EM energy speedProp Delay = distance / EM energy speed
= 3,000,000 m / 200,000,000 m/sec = 3,000,000 m / 200,000,000 m/sec = 0.015 seconds = 0.015 seconds
Packet inject time = 8,376 bits / 45 Mbits/secPacket inject time = 8,376 bits / 45 Mbits/sec = 186.1 = 186.1 μμseconds (PPP, IPv4, TCP overhead)seconds (PPP, IPv4, TCP overhead)
NPD = 0.015 / 0.0001861 = 80.60NPD = 0.015 / 0.0001861 = 80.60 80.60 average sized packets will fit back-to-back on this line80.60 average sized packets will fit back-to-back on this line
#1#2#3
Throughput on 45 Mbps LineThroughput on 45 Mbps Line
Server PC
3,000 Km, 45 Mbps line
At this instant in time, the Server...At this instant in time, the Server... Has transmitted 64 packets w/o ACK.Has transmitted 64 packets w/o ACK. Has hit window limit. Halts.Has hit window limit. Halts.
Packets 1 - 64
Throughput on 45 Mbps LineThroughput on 45 Mbps Line
Server PC
3,000 Km, 45 Mbps line
At this instant in time, At this instant in time, The PC has processed 1st packet & sent an ACKThe PC has processed 1st packet & sent an ACK The Server is still halted, waiting for ACK #1.The Server is still halted, waiting for ACK #1.
When ACK #1 arrives, server can then transmit one When ACK #1 arrives, server can then transmit one additional packet.additional packet.
Other ACK’s arrive fast enough to allow back-to-back Other ACK’s arrive fast enough to allow back-to-back transmission of next group of 64 packetstransmission of next group of 64 packets
Packets 2 - 64 #1
ACK#1
Can Estimate Throughput with a Time LineCan Estimate Throughput with a Time Line
timeto = 0
ttoo: Leading edge of 1st packet injected: Leading edge of 1st packet injected
tt11: Trailing edge of 64th packet injected: Trailing edge of 64th packet injected
tt11 = (64*1047B)(8b/B)/(45 Mb/sec) = 11.91 msec = (64*1047B)(8b/B)/(45 Mb/sec) = 11.91 msec
tt22: Leading edge of 1st packet hits far side: Leading edge of 1st packet hits far side
15 msec (propagation delay)15 msec (propagation delay) If ACK injected right away...If ACK injected right away...
tt33: ...ACK arrives at server at t = 30 msec: ...ACK arrives at server at t = 30 msec
Process Repeats...Process Repeats...
t1 t2 t3
Can Estimate Throughput with a Time LineCan Estimate Throughput with a Time Line
time (msec)to = 0
This system can transmitThis system can transmit 64(1,047) = 67,008 B = 536,064 bits64(1,047) = 67,008 B = 536,064 bits Every 30 msec (one round trip time)Every 30 msec (one round trip time) Estimated throughput = 536,064/0.03 = 17.89 MbpsEstimated throughput = 536,064/0.03 = 17.89 Mbps
Actual throughput a bit lowerActual throughput a bit lower 1st ACK not transmitted until packet #1 fully received...1st ACK not transmitted until packet #1 fully received...
... and processed by PC... and processed by PC 65th packet not transmitted until ACK #1 fully received...65th packet not transmitted until ACK #1 fully received...
... and processed by Server... and processed by Server
11.91 15.00 30.00
Can Estimate Throughput with a Time LineCan Estimate Throughput with a Time Line
time (msec)to = 0
Need to be able to fill the pipe for 1 RTTNeed to be able to fill the pipe for 1 RTT 30 msec in our example30 msec in our example 45 Mbps * .030 sec = 1.35 M b = 168,750 B 45 Mbps * .030 sec = 1.35 M b = 168,750 B
= 168,750/1,047 = 161.2 packets = 168,750/1,047 = 161.2 packets Window Size needs to be = Window Size needs to be =
161.2 segments*1,000 bytes/segment = 161,200 B161.2 segments*1,000 bytes/segment = 161,200 B
Actually would need another segment or two to cover source & sink Actually would need another segment or two to cover source & sink processing processing
11.91 15.00 30.00
TCP HeaderTCP Header
Source Port Destination Port
Sequence Number
ACK Number
Window
Checksum
4 Bytes
UDP Header (8 Bytes)UDP Header (8 Bytes)
Source Port Destination Port
Checksum
4 Bytes
For interactive real-time traffic, usually used with Real Time Transport Protocol (12 bytes).
Virtual CircuitsVirtual Circuits Routing decisions made Routing decisions made onceonce when when
circuit is set upcircuit is set up Concerned switches have internal Concerned switches have internal
Look-Up tables updatedLook-Up tables updated All packets part of info transfer followAll packets part of info transfer follow
the same path the same path Allows option of setting aside switch resources (buffer Allows option of setting aside switch resources (buffer
space, bandwidth) for specific traffic flowsspace, bandwidth) for specific traffic flows MPLS, Frame Relay, ATM, & Carrier Ethernet use MPLS, Frame Relay, ATM, & Carrier Ethernet use
VC’sVC’s
DatagramsDatagrams
IP uses Datagrams IP uses Datagrams Routing Tables updated independently of Routing Tables updated independently of
individual traffic flowsindividual traffic flows Routers continuously talking with each otherRouters continuously talking with each other Packets may follow different pathsPackets may follow different paths
Routers get no advance warning of Routers get no advance warning of specific packet flows.specific packet flows.
IP is ConnectionlessIP is Connectionless
Data + Padding
20 20 up to 1,460
IP TCP
I/O decisions based on IP address & look-up table.Tables updated independent of traffic, hence paththru network may suddenly change.
TCP is connection oriented.
TCP, UDP, and IPTCP, UDP, and IP 30+ year old Protocols 30+ year old Protocols
Designed for dataDesigned for dataOne Utilized Priority & “Best Effort” servicesOne Utilized Priority & “Best Effort” servicesNo QoS GuaranteesNo QoS GuaranteesAvailable bandwidth depends on otherAvailable bandwidth depends on other users users
TCP (Layer 4 & 5) provides reliable transferTCP (Layer 4 & 5) provides reliable transfer UDP (Layer 4 & 5) unreliable transferUDP (Layer 4 & 5) unreliable transfer IP at Layer 3IP at Layer 3 Arbitrary Protocols at Layers 1 & 2Arbitrary Protocols at Layers 1 & 2
InternetTraffic2008 - 2009 Comparison
InternetTraffic2008 - 2009 Comparison
sou
rce:
htt
p://
ww
w.s
andv
ine.
com
s
Fixed Access Internet Traffic ProfileFixed Access Internet Traffic Profile
Source: www.sandvine.com/downloads/documents/Phenomena_2H_2012/ Sandvine_Global_Internet_Phenomena_Snapshot_2H_2012_NA_Fixed.pdf & www.sandvine.com/downloads/general/global-internet-phenomena/2014/1h-2014-global-internet-phenomena-report.pdf
2013
2015 Fixed Access2015 Fixed Access
https://www.sandvine.com/downloads/general/global-internet-phenomena/2015/global-internet-phenomena-report-latin-america-and-north-america.pdf
2012 Mobile Access Internet Traffic Profile2012 Mobile Access Internet Traffic Profile
http://www.sandvine.com/downloads/documents/Phenomena_2H_2012/ Sandvine_Global_Internet_Phenomena_Snapshot_2H_2012_NA_Mobile.pdf
2013 Mobile Access Internet Traffic Profile2013 Mobile Access Internet Traffic Profile
source: www.sandvine.com/downloads/general/global-internet-phenomena/2014/1h-2014-global-internet-phenomena-report.pdf
2015 Mobile Access2015 Mobile Access
https://www.sandvine.com/downloads/general/global-internet-phenomena/2015/global-internet-phenomena-report-latin-america-and-north-america.pdf
Internet Traffic GrowthInternet Traffic Growth
source: "The Road to 100G Deployment", IEEE Communications Magazine, March 2010
Internet Traffic GrowthInternet Traffic Growth
source: www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/VNI_Hyperconnectivity_WP.html
Combining the Figures
Combining the Figures
VoIPVoIP
PC to PCPC to PC Internet Phone to Internet PhoneInternet Phone to Internet Phone
CommodityInternet
VoIPVoIP PC to Wired PhonePC to Wired Phone Internet Phone to Wired PhoneInternet Phone to Wired Phone
CommodityInternet
Gateway
PhoneSystem
VoIP (Wired Phone-to-Wired Phone)VoIP (Wired Phone-to-Wired Phone) Carrier prioritizes VoIP traffic Carrier prioritizes VoIP traffic (DiffServ)(DiffServ) Paths nailed down Paths nailed down (MPLS)(MPLS) Gateways control # of voice callsGateways control # of voice calls Good Quality Possible with this configurationGood Quality Possible with this configuration
"QoS Enabled"Internet
Gateway
PhoneSystem
Gateway
PhoneSystem
Traditional VideoconferencingTraditional Videoconferencing
Camera Codec
384 Kbps fixed rate output
(video + audio)
Codec
Audio
Video
Dedicated BandwidthNetwork:Circuit Switched TDM6 Bytes @ 8000 times/sec *State Owned Fiber *ISDN
2002 Videoconferencing V2.02002 Videoconferencing V2.0
Camera Codec
384 Kbps fixed rate output
(video + audio) Now > 784 Kbps
Codec
Audio
Video
Packet Switched StatMuxedPrioritized *State Owned Fiber
This is technique beingused in this class for video to & from Tulsa & Stillwater.
Internet Video StreamingInternet Video Streaming
PC
Disk Drive
The InternetQuality of Received Streamdepends on:(1) Size of your pipe.(2) Internet congestion.(3) Server congestion.
Internet Video StreamingInternet Video Streaming
StillwaterVideo Server
generates packets.
Fairly steady generation if server not swamped.Rate depends on pipe size.
Disk Drive
Internet Video StreamingInternet Video Streaming
Disk Drive
Internet
Video Server
Packets exit at an irregular rate.Random delays.
Non-Dedicated Bandwidth(Packet Switched, Stat Muxing)
ISP Routes can be RoundaboutISP Routes can be Roundabout
Launched 30 January 2007, 2 miles from OSU campus 1 Dr. Scheets' home router 6 SBC routers
adsl-70-233-191-254.dsl.okcyok.sbcglobal.net ex2-p11-0.eqchil.sbcglobal.net
7 Level3 routers Te-3-2.Chicago1.Level3.net kscymo2wcx010-pos9-0-oc48.wcg.net tulsok6wcx2-pos11-0-oc48.wcg.net
5 ONENET routers at least 1 in Oklahoma City
3 Oklahoma State routers3 Oklahoma State routers
Using DiffServe, End-to-End performance onthis 22 router path ...
ISP Routes can be RoundaboutISP Routes can be Roundabout
Launched 5 September 2008, 2 miles from OSU campus 1 Scheets' home router 4 SBC routers
adsl-70-233-191-254.dsl.okcyok.sbcglobal.net bb1-g1-0-2.rcfril.sbcglobal.net
1 Equinix router 1 Transitrail router
onenet.chcgil01.transitrail.net 3 ONENET routers
at least 1 in Oklahoma City 4 Oklahoma State routers4 Oklahoma State routers rtt = 55 msecrtt = 55 msec
...may be worsethan End-to-Endperformance onthis 14 router path when not using DiffServ.
LAN
LAN
Internet Service Provider NetworkInternet Service Provider Network
RouterRouter
TrunksLeased Line
PC
PC
Corporate sites using Internet as WAN.Can pay ISP extra $$ → Traffic between sites gets preferential treatment.
Interactive VOICE & VIDEO over the commodity INTERNET
(Best Effort, No Priorities)
Interactive VOICE & VIDEO over the commodity INTERNET
(Best Effort, No Priorities) Is not ready for Prime TimeIs not ready for Prime Time Delay & Quality problems Delay & Quality problems difficult to solve difficult to solve under the under the
current system...current system... ...although throwing Bandwidth at the problem will ...although throwing Bandwidth at the problem will
alleviatealleviate Has a place for the user whose main concern is $$$$ or Has a place for the user whose main concern is $$$$ or
convenienceconvenience
LAN
LAN
Internet Service Provider NetworkInternet Service Provider Network
Routers operate at Layers 1-3.PC’s operate at Layers 1-7. Routers do not monitor opening of TCP Logical Connections. RSVP would change this.
RouterRouter
TrunksLeased Line
PC
PC
Multi-Protocol Label Switching
Multi-Protocol Label Switching
Enables Virtual CircuitsEnables Virtual Circuits End-to-End Paths nailed downEnd-to-End Paths nailed down Traffic Engineering EasierTraffic Engineering Easier Resource Reservation EasierResource Reservation Easier
Seeing fairly widespread ISP deploymentSeeing fairly widespread ISP deployment
Internet QoSInternet QoS Most every ISP is installing or testing one or more of Most every ISP is installing or testing one or more of
following...following... DiffServDiffServ MPLSMPLS Resource Reservation capabilityResource Reservation capability Pricing structure to reflect different QoSPricing structure to reflect different QoS
... but they are not yet widely deployed.... but they are not yet widely deployed. As a result, currently the Commodity Internet As a result, currently the Commodity Internet
remains mostlyremains mostly Best Effort, FIFO RoutingBest Effort, FIFO Routing
Thinking of moving large amountsof high quality, time sensitive
traffic over the Commodity Internet?
Thinking of moving large amountsof high quality, time sensitive
traffic over the Commodity Internet?
Check back in 2-3 years when...Check back in 2-3 years when... Priorities Enabled (IPv6 and/or DiffServ)Priorities Enabled (IPv6 and/or DiffServ) Resources Guaranteed Resources Guaranteed
(Resource Reservation Protocol (RSVP) or equivalent is (Resource Reservation Protocol (RSVP) or equivalent is deployed)deployed)
Flat rate pricing is goneFlat rate pricing is gone
The Internet Is... The Internet Is... A superb information sourceA superb information source
Sometimes difficult to separate wheat from chaffSometimes difficult to separate wheat from chaff IEEE Communications or ProceedingsIEEE Communications or Proceedings
Peer Reviewed Peer Reviewed
IEEE Spectrum IEEE Spectrum Reviewed by editorReviewed by editor
Jane Doe's Web siteJane Doe's Web site Reviewed by Jane DoeReviewed by Jane Doe
A good marketing toolA good marketing tool
The Internet Is... a Security Nightmare
The Internet Is... a Security Nightmare
Any-to-Any connectivity is both strength and weaknessAny-to-Any connectivity is both strength and weakness Tracert yields Router IP AddressesTracert yields Router IP Addresses Could Telnet or HTTP to many. Password?Could Telnet or HTTP to many. Password?
EspionageEspionage Read “The Cuckoo’s Egg” by Cliff StollRead “The Cuckoo’s Egg” by Cliff Stoll
Former #1 on New York Times Best SellerFormer #1 on New York Times Best SellerRecommended by Dr. Scheets’ MomRecommended by Dr. Scheets’ Mom
The Internet Is... a Security Nightmare
The Internet Is... a Security Nightmare
Bad things have been out there for years Viruses, Worms, Trojans, Denial of Service, etc.
November 2, 1988 Internet Worm Network shut down for 2-3 days Took advantage of
Unix buffer overflow problems Poor password choices
2009-2010 Stuxnet Worm2009-2010 Stuxnet Worm State sponsored?State sponsored? Seemed to target Iran's nuclear bomb programSeemed to target Iran's nuclear bomb program
The Internet Is... a Security Nightmare
The Internet Is... a Security Nightmare
TCOM5223TCOM5223Information Assurance ManagementInformation Assurance Management
TCOM5233TCOM5233Applied Information Systems SecurityApplied Information Systems Security
TCOM5243TCOM5243Information Technology ForensicsInformation Technology Forensics
““Remember, when you connect with another Remember, when you connect with another computer, you're connecting to every computer that computer, you're connecting to every computer that computer has connected to.”computer has connected to.” Dennis Miller, Saturday Night LiveDennis Miller, Saturday Night Live
Pros of Using the InternetPros of Using the Internet
Any-to-Any Connectivity It’s Inexpensive (save $$$$) Tons of valuable information available Excellent marketing/sales tool
Cons of Using the Commodity InternetCons of Using the Commodity Internet Any-to-Any Connectivity
puts all attached machines at risk
Slightly higher risk of Theft of Traffic Tons of Worthless Information Available No QoS guarantees or Guaranteed Bandwidth
May have trouble rapidly moving large filesMay have trouble reliably moving time
sensitive traffic
WARNING: SECURITY HAZARD!
802.3 Ethernet Packet Format802.3 Ethernet Packet Format
MACDestination
Address
MACSource
Address
CRCData + Padding
Bytes: 7 1 6 6 2
40 20 6-1440 4
IPv6 TCP
Connectionless vs. Connection Oriented
Connectionless vs. Connection Oriented
Connectionless* Packet delivery may be out of order * Packet delivery NOT guaranteed* Packets may be mangled* End User’s responsibility to fix any problems
Connection Oriented* Packet delivery in order* Packet delivery usually guaranteed
IP is ConnectionlessIP is Connectionless
Data + Padding
20 20 up to 1,460
IP TCP
I/O decisions based on IP address & look-up table.Tables updated independent of traffic.
Wide Area Connectivity OptionsWide Area Connectivity Options Leased Line (a.k.a. Private Line) Network
Switches are byte aware Circuit is assigned trunk BW via TDM
BW required is based on peak input rates
Route through system determined in advance. Pricing function of distance & peak rate Most expensive connectivity option Highest quality connectivity option
Leased Line UsageLeased Line Usage U.S. Revenues still around U.S. Revenues still around
$34 Billion in 2009$34 Billion in 2009 Drop in CorporateDrop in Corporate Increase in wireless Increase in wireless
backhaulbackhaul
$30 Billion in 2014$30 Billion in 2014 Shift is to Internet ServicesShift is to Internet Services
source: Insight Research
Switched Ethernet LAN'sSwitched Ethernet LAN's
100, 1,000 Mbps10/100 Mbps
EdgeRouter
PC
PC
PC
PC
PC
PC
PC
SwitchedHub
SwitchedHub
SwitchedHub
Leased Lines
Telecom Carriers dedicate 320, 128, and 256 Kbps links for our sole use via Circuit Switching.
OKC
Detroit
NYC
Carrier LeasedLine Network
Router
Leased Line
Ex) Corporate Leased Line ConnectivityEx) Corporate Leased Line Connectivity
320 Kbps
256 Kbps
128 Kbps
OKC
Detroit
NYC
Carrier LeasedLine Network
Router
384 Kbps
From/ToFrom/To OKCOKC DETDET NYCNYC
OKCOKC -- 144144 7676
DETDET 8888 -- 2828
NYCNYC 112112 3434 --
320 Kbps
Ex) Corporate Leased Line ConnectivityEx) Corporate Leased Line Connectivity
How will company connect to Internet?How will company connect to Internet?
ConfigurationConfiguration Every site connect locally?Every site connect locally? All sites connect thru, say, OKC?All sites connect thru, say, OKC?
Type of connectionType of connection Leased LineLeased Line DSL?DSL? Cable Modem?Cable Modem? Other?Other?
Ex) Internet thru OKCEx) Internet thru OKC
Traffic matrix should expand to includeISP. Faster line speeds likely required.
OKC
Detroit
NYC
Carrier LeasedLine Network
Router
Leased Line
ISP
OKC
Detroit
NYC
Carrier LeasedLine Network
Router
ISP
Ex) Internet thru OKCEx) Internet thru OKC
From\ToFrom\To OKCOKC DETDET NYCNYC ISPISP
OKCOKC -- 144144 7676 6060
DETDET 8888 -- 2828 5050
NYCNYC 112112 3434 -- 4040
ISPISP 110110 100100 9090 --
How big should the pipeto the ISP be?300 Kbps is outbound from ISP> 640 Kbps circuit needed.
640 Kbps
OKC
Detroit
NYC
Carrier LeasedLine Network
Router
576 Kbps
ISP
448 Kbps
Ex) Internet thru OKCEx) Internet thru OKC
From\ToFrom\To OKCOKC DETDET NYCNYC ISPISP
OKCOKC -- 144144 7676 6060
DETDET 8888 -- 2828 5050
NYCNYC 112112 3434 -- 4040
ISPISP 110110 100100 9090 --
Need to bump size of other 2 pipes.194/186 I/O @ NYC → 448 Kbps278/166 I/O @ DET → 576 Kbps
640 Kbps
Top Related