• Save
Slideshare
Upcoming SlideShare
Loading in...5
×
 

Slideshare

on

  • 214 views

The Presentation is based on Next Generation Telecom Network.

The Presentation is based on Next Generation Telecom Network.

Statistics

Views

Total Views
214
Views on SlideShare
214
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

CC Attribution License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Slideshare Slideshare Presentation Transcript

  • DEPLOYMENT OF NEXT GENERATION TELECOM TRANSPORT NETWORK
  • CONTENTS • • • • • • • • • • • • • INTRODUCTION OBJECTIVES LITERATURE SURVEY PROBLEM DEFINITION FLOW CHART ROUTING PROTOCOL BLOCK DIAGRAM SERVER CONFIGURATION HARDWARE CONFIGURATION ROUTER vs. SWITCH IPv4 vs. IPv6 SECURITY REFERENCES
  • INTRODUCTION • Evolution of Packet based telecom network from circuit based network. • Supports voice, video with audio and data . • Configuration of secure network. an optimally • Provides service to a larger group of internet users at the
  • OBJECTIVE • The main objective of the project is to form a network which will offer IPv6(next generation) services for new users(IPv6) as well as the existing users(IPv4) i.e. there will be co-existence of both versions of IP. • Successful deployment of IPv6 network. • Configuring firewall at network
  • LITERATURE SURVEY YEAR OF PUBLISH PAPER TITLE RESEARCHER/ AUTHOR TECHNIQUES WITH PERFORMANCE 2012 Internationa l Conference on Information Society (iSociety 2012) Necessity to Migrate to IPv6 Rahathullah Khan Hussain Fouad Sindi This paper describes the migration from the current Internet Protocol (IPv4) to the next generation of Internet Protocol (IPv6) and to adapt the new technologies which probably grows into our networks. 2011 Fourth Internationa l Conference on Intelligent Computation Technology and Automation The Research and Application of Internet Protocol Version 6 (IPv6) Zhenqi Wang, Mei Yan North China Electric Power University, Baoding, Hebei, 071003, China yanmeimm@126.com With the rapid development of the applications based on Internet, the traditional network of based IPv4 protocol has been overwhelmed, and IPv6 protocol becomes the dominant protocol for the next generation Internet.
  • LITERATURE SURVEY YEAR OF PUBLISH PAPER TITLE RESEARCHER/ AUTHOR TECHNIQUES WITH PERFORMANCE 2010 Technologies for Homeland Security (HST), 2010 IEEE International Conference Securing IPv6 network infrastructur e: A new security model Choudhary. A.R. SEGMA Technol. Inc., Silver Spring, MD, USA Sekelsky, A. • It briefly presents the new IPv6 capabilities. • It presents a analysis of the security vulnerabilities arising from these capabilities • It presents a new security model for IPv6 network infra. that has the potential to mitigate these vulnerabilities. 2009 2009 International Conference on Communicatio n Software and Networks Design and Implementati on of Distributed Firewall System for IPv6 Yingxu Lai, Guangzhi Jiang, Jian Li, Zhen Yang, Department of Information Security Institute of Computer Science, Beijing This paper introduces the implementation of Distributed Firewall System (DFS) that can be applicable to the IPv6 network and has capabilities of processing encrypted IPSec packet.
  • LITERATURE SURVEY YEAR OF PUBLISH PAPER TITLE RESEARCHER/ AUTHOR TECHNIQUES WITH PERFORMANCE 2011 Network Protocols (ICNP), 2011 19th IEEE International Conference on 17-20 Oct. 2011 IPv6 evolution, stability and deployment Xiaoke Jiang Networking is growing with Dept. of rising exponential pace. Comput. Sci., Network itself and its routing Tsinghua Univ., system become more and more Beijing, China stable. And here they have Bi, Jun ; explored special properties Yangyang Wang ; of this preliminary network, Zhijie He ; Wei to provide data which help Zhang ; deploy IPv6. Hongchen Tian 2008 Southeastcon, 2008. IEEE . 3-6 April 2008 An examination of IPv4 and IPv6 networks : Constraints and various transition mechanisms Jivika Govil Maharshi Dayanand Univ., Delhi Jivesh Govil ; Kaur, N. Kaur, H. • This paper discusses constraints, various techniques and standards require for high level compatibility smooth transition between IPv4 and IPv6 by removing the constraints. • It is impossible to switch the entire internet over to IPv6
  • PROBLEM DEFINITION • In IPv4 networks IDs allocation is very critical. • IPv6 is required because of the fast depletion of IPv4 addresses. • Apart from this it is also necessary to implement an optimal security system in any network • Securing data while they are transmitted from server to client.
  • FLOW CHART Study of various protocols & applications of the project Configuring and connecting hardware peripherals in IPv4 Software configuration of the server Performing same procedure for IPv6 Implementing data security on packet data Testing Services & network connectivity
  • ROUTING PROTOCOL OSPF: Open Shortest Path First • Is a link-state routing protocol • Suitable for serving large, heterogeneous internetworks. • OSPF can calculate the routes in a short amount of time. • Link-state advertisements (LSA)
  • Fig.1 OSPF
  • Serv er side Clie nt side Fig.2 BLOCK DIAGRAM
  • SERVER CONFIGURATIONS • DNS SERVER DNS will assign domain names to each IP address. • FTP SERVER Transfer files from one system to another system. • EMAIL SERVER Used to communicate with clients in a company. • WEB SERVER Web server is use to host websites. • VOIP SERVER Used for placing and transmitting
  • HARDWARE CONFIGURATIONS • ROUTERS A router is a device that forwards data packets between computer networks It ensures that information doesn't go where it's not needed. NETWORK 2 10.1.1.0/ 255.255.255.0 NETWORK 1 ROUTER NETWORK 10.0.1.0/ 255.255.255.0 3 10.2.1.0/ 255.255.255.0 Fig. 3 Routing
  • HARDWARE CONFIGURATIONS • SWITCHES A switch, keeps a record of the MAC addresses of all the devices connected to it. With this information, a switch can identify which system is sitting on which port. So when a frame is received, it knows exactly which port to send it to. CISCO 2960 SWITCH Footer Text Fig.4 Switching
  • Router vs. Switch ROUTER SWITCH Operates at network layer of OSI model Operates at data layer of OSI model Connect to one or more network Connects devices in a LAN Consist of a combination of hardware and software Uses switching table to find the correct destination Data is grouped into packets It has buffer for each link which which has a physical and logical stores the data until that address. particular link is free. Keeps a tale of IP Addresses Keeps a table of known MAC addresses
  • IPv4 vs. IPv6 IPv4 IPv6 Source and destination addresses Source and destination addresses are 32 bits (4 bytes) in length. are 128 bits (16 bytes) in length. IPv6 address is written as IP address is written as 8.8.8.8 FABC:AC77:7834:2222:FACB: AB98:5432:4567 Must be configured manually or through DHCP Does not require manual configuration IPv4 header has checksum which must be compared by each router IPv6 has no header checksum Security in IPv4 networks is limited to tunnelling between two networks IPv6 has been designed to satisfy the growing and expanded need for network security Classes: Class A B C D E Classes: Unicast Anycast
  • HARDWARE CONFIGURATIONS • FIREWALL • Used to help keep a network secure. • Can be either software-based or hardware-based. • To control the incoming and outgoing network traffic. Fig.5 Security
  • SECURITY DMZ Technique • DMZ or Demilitarized Zone • Contains and exposes an organization's external-facing services to an untrusted network, usually the Internet. • Adds an additional layer of security to an organization's LAN Fig.6 DMZ Concept
  • REFERENCES [1] Necessity to Migrate to IPv6,Rahathullah Khan,Hussain Fouad Sindi,International Conference on Information Society (i-Society 2012) [2] Design and Implementation of Distributed Firewall System for IPv6,Yingxu Lai, Guangzhi Jiang, Jian Li, Zhen Yang 2009 International Conference on Communication Software and Networks [3] The Research and Application of Internet Protocol Version 6 (IPv6) Zhenqi Wang, Mei Yan 2011,Fourth International Conference on Intelligent Computation Technology and Automation [4]Efficient Security for data using cryptographic protocol,Vaishnavi .R, Janarthan R INCACEC,2009 IEEE International Conference [5]Data Security in packet switched network,
  • REFERENCES [6]Transition from IPv4 to IPv6: A state of art survey,IEEE Communication Survey,Third quarter 2013.. [7] CCNA : Cisco Certified Network Associate Study Guide (Exam 640802) , 6th Edition, Todd Lammle, By Wiley Publications,2007, retrieved on 10th October 2012. [8]Computers Networks(5th Addition) : Andrew S. Tanenbaum. [9]Data Communication And Networking: Behrouz A Forouzan.
  • Thank You…