With so many new line of products and features from MikroTik, choosing one might be bit confusing. This topic will cover how to choose the right devices for your network!
Multicast routing configuration and lab example in MikroTik
video multicast routing 1 router
https://www.youtube.com/watch?v=nqUlUIB93Mg
video multicast routing 2 router over wireless
https://www.youtube.com/watch?v=eYEocGYsGZ4
Konfig VLC sebagai stream server multicast
https://www.youtube.com/watch?v=Z1lthcBSSrM
Konfig VLC sebagai player
https://www.youtube.com/watch?v=s2uTs8NRQpY
Multicast routing configuration and lab example in MikroTik
video multicast routing 1 router
https://www.youtube.com/watch?v=nqUlUIB93Mg
video multicast routing 2 router over wireless
https://www.youtube.com/watch?v=eYEocGYsGZ4
Konfig VLC sebagai stream server multicast
https://www.youtube.com/watch?v=Z1lthcBSSrM
Konfig VLC sebagai player
https://www.youtube.com/watch?v=s2uTs8NRQpY
This presentation was presented at MUM Indonesia at Bali in 2008. Discussed about how to put extra layer of security into your MikroTik Router using Port Knocking mechanism.
Marek Isalski, Faelix.net Ltd, describes the MikroTik range of routers and their applications, gives a pros and cons summary, and recommendations for budget provider edge deployment.
How to manage internet clients of an ISP with PPPoE and MikroTik. For
centralized AAA (Authentication, Authorization and Accounting), freeRadius is used.
Alexis Dacquay – is CCIE with over 10 years experience in the networking industry. He has in the past been designing, deploying, and supporting some large corporate LAN/WAN networks. He has in the last 4 years specialised in high performance datacenter networking to satisfy the needs of cloud providers, web2.0, big data, HPC, HFT, and any other enterprise for which high performing network is critical to their business. Originally from Bretagne, privately a huge fan of polish cuisine.
Topic of Presentation: Handling high-bandwidth-consumption applications in a modern DC design
Language: English
Abstract: Modern Data Centre requires proper handling of high-bandwidth consuming applications, like BigData or IP Storage. To achieve this, next generation Ethernet speeds of 25, 50 and 100Gbps are being pursued. We are to show _why_ these new Ethernet speeds are vital from technology standpoint and _how_ to cope with the those sparkling new requirements by networking hardware enablements. We are to share ethernet switches’ design considerations, with the biggest emphasis put on the importance of big buffers and how they accommodate this bursty traffic. Throughout the presentation we will additionally elaborate on the evolution of variety of modern applications, and how we can handle those with the properly designed hardware, software, and Data Centre itself.
This presentation was presented at MUM Indonesia at Bali in 2008. Discussed about how to put extra layer of security into your MikroTik Router using Port Knocking mechanism.
Marek Isalski, Faelix.net Ltd, describes the MikroTik range of routers and their applications, gives a pros and cons summary, and recommendations for budget provider edge deployment.
How to manage internet clients of an ISP with PPPoE and MikroTik. For
centralized AAA (Authentication, Authorization and Accounting), freeRadius is used.
Alexis Dacquay – is CCIE with over 10 years experience in the networking industry. He has in the past been designing, deploying, and supporting some large corporate LAN/WAN networks. He has in the last 4 years specialised in high performance datacenter networking to satisfy the needs of cloud providers, web2.0, big data, HPC, HFT, and any other enterprise for which high performing network is critical to their business. Originally from Bretagne, privately a huge fan of polish cuisine.
Topic of Presentation: Handling high-bandwidth-consumption applications in a modern DC design
Language: English
Abstract: Modern Data Centre requires proper handling of high-bandwidth consuming applications, like BigData or IP Storage. To achieve this, next generation Ethernet speeds of 25, 50 and 100Gbps are being pursued. We are to show _why_ these new Ethernet speeds are vital from technology standpoint and _how_ to cope with the those sparkling new requirements by networking hardware enablements. We are to share ethernet switches’ design considerations, with the biggest emphasis put on the importance of big buffers and how they accommodate this bursty traffic. Throughout the presentation we will additionally elaborate on the evolution of variety of modern applications, and how we can handle those with the properly designed hardware, software, and Data Centre itself.
Nice presentation by Nokia talking about 5G network and radio enhancements such as 5G Quality of Service, Netowrk Slicing, Latency Reduction and architecture issue. Thanks Benoist for this and your work in 3GPP RAN2.
In order for the Internet of Things to function properly, a reliable wireless technology needs to be available. Radio frequencies are some of the most popular and effective means for IoT communication.
Introducing the Future of Data Center Interconnect NetworksADVA
Our ADVA FSP 3000 CloudConnect™ is the future of Data Center Interconnect (DCI) networks. It’s a highly scalable, energy efficient and truly open platform. With our DCI technology, there are no more limits, no more restrictions. A new era of possibilities has arrived.
5G Is Overhyped - Learn What It Can Really DoWalt Maclay
Learn what 5G cellular will really deliver for the three very different use cases: cell phones, on-premise equipment, and low data rate IoT. Much of what is promoted is much more limited than what has been advertised, for example, coverage areas and speed.
Also, learn what will be different about IoT communication. The future with 5G will be different. Learn what it will really be like. Join us for an engaging talk and Q & A with Walt Maclay, Voler Systems, Electronic Product Design experts in wearable, IoT, medical and consumer products.
High performance browser networking ch7,8Seung-Bum Lee
Presentation material including summary of "High Performance Browser Networking" by Ilya Grigorik. This book includes very good summary of computer network not only for internet browsing but also multimedia streaming.
In this deck, Gilad Shainer from Mellanox provides an overview of new products for the SC15 conference.
Learn more: http://mellanox.com
Watch the video presentation: http://wp.me/p3RLHQ-eJu
Sign up for our insideHPC Newsletter
Similar to Choosing MikroTik for Your Network (20)
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
4. Program Kemitraan
Membuka kesempatan untuk menyelenggarakan training MikroTik di kota Anda.
Proposal kemitraan dapat di download di :
http://goo.gl/UmejXk
5. MikroTik launch new products regularly
•New line of products for different puropses
10. So how to Choose the right MikroTik for your network?
11. Know your network
•How big it is?
-How many users?
-How many branch or point of presence?
-Will it be expanded?
•How much traffic will flow through your network?
•If there are existing network, any issues in current environment? Eg. Congestion, bottleneck, slow.
12. Know your application
•What kind of application will rely on your network?
•Application characteristics
- demand low latency?
- need high troughput?
- have small / big packet size?
- have minimum bandwitdh requirement?
13. Know features you want to implement
•Do you need routing or switching?
•Do you need wireless interface?
•What services do you run? eg. PPPoE server, Hotspot
•Do you need encryption? eg. IPSEC
•Require special protocol? eg. ISIS
•Require specific security standard? Eg. PCI DSS
14. Where to begin?
Go to www.routerboard.com
is always a good start
15. Identify Device features
> CPU / Processing Power
> Memory
> Interface type & Interface speed
> Wireless Speed & protocol standard
> Expansion Slot
> Device extra feature
> Designed Capacity
16. CPU / Processing Power
•Impact on troughput
•Impact on latency
•When running services, impact on how many user that you can serve
Based on implementation experience :
400 Mhz for 5-10 Mbps traffic
600 Mhz for 10 – 20 Mbps traffic
720 Mhz for 20-40 Mbps traffic
1066 Mhz for traffic < 100 Mbps
1.2 Ghz & multicore for higher traffic
17. Memory
•Impact on features (logging, queues, webproxy, hotspot)
RouterOS use just small amount of RAM,
But other features like queues, log, webproxy, firewall will eat memory
18. Interface type
All ethernet type minimum 10 Mbps
•Fast Ether (up to 100 Mbps speed)
•Gigabit Ether (up to 1 Gbps speed)
•SFP (up to 1 Gbps speed)
•SFP+ (10 Gbps speed)
19. Wireless Standard
Wireless standard - impact on troughput :
802.11a - 54 Mbps (rarely used)
802.11b – 11 Mbps (obsolete)
802.11g – 54 Mbps (obsolete)
802.11n – 150 Mbps (SISO) – 300 Mbps (MIMO)
802.11ac – 844 Mbps
Wireless procotol – impact on latency and link quality over distance :
802.11
nstreme
Nv2
Caveat :
Wireless data rate is theoritical speed, it has never achieved in the real network
20. Expansion Slot
RB RB953GS-5HnT-RP
Simply has it all!!
3x Gigabit Ethernet, 2xSFP cage, built-in 5GHz 3x3 MIMO wirelss, 2x miniPCI- e, 2x SIM, USB, 3xRPSMA connectors
21. Power Features
RB-750UP
PoE In
Recive power via ethernet cable
PoE Out
Supply power to other devices
Ports 2-5 can supply with the same voltage as applied to the unit. Less power adapters and cables to worry about! Max current is 500mA per port,
22. Designed Capacity
Usually can get the information from products brochure : http://i.mt.lv/routerboard/files/CCR1036-8G-2Splus-131030144844.pdf
23. Case Study 1 :
Chain Hotel group
- One hosted application on Headoffice
Hotel Property management system (using Citrix)
- Headoffice already 2 dedicated Internet connection
-Have 14 branch accross Java, Sumatra, Borneo
-Average 10 user in each branch access PMS
-Want resilient connection, if primary fail switch to secondary
- Several branch have minimum 1 dedicated internet connection, and option ASDL and 3G connection for backup
- Each site should connect securerly with vpn over internet encrypted using IPSEC
24. Sizing
Characteristic of application (using citrix)
-small bandwitdh 64-256kbps per concurrent connection, average 128k
-Need latency < 60 ms
25. Bandwitdh Needed
Head office :
Average 10 user per branch x 14 = 140 user x ~128 kbps = 17 Mbps on head office
Overhead for vpn tunnel 12% of total traffic = 2,4 Mbps
Recomended minimum dedicated internet = ~20 Mbps per line
Branch Office :
10 user per branch x 128k = 1280 kbps ~ 1.5 Mbps dedicated internet conection
Backup conection : 2 mbps ADSL should be enough
26. Encryption
They want secure tunnel communication using IPSEC, we better choose routerboard device in head office and branch office that have dedicated encryption chip
The choice :
CCR series
RB1100 series, but in branch should also support 3G
So we go with CCR-1036 EM in head office
and RB1100AHx2 with additional 3G router
29. If the IPSEC is not mandatory and aplication is using HTTP (web)
•We can use RB1100AHx2 in Head office since traffic is less than 100 Mbps
•And use RB2011 in the branch office because traffic is not more than 10 Mbps and application is not latency sensitive
•We can remove 3G modem and put usb directly to RB2011
30. Case Study 2
•Engineering Company, have 130 workers
•Split into two buildings, separated by 1.5km
•They have 5 departement and separated network by vlan (server, IT, mgmt, staff, and guest)
•Want to interconnect between sites and apply the vlan rules
•There are file sharing server in building 1
•Main application is web based, and they also have IP phone for each workers.
32. Sizing
•Application file sharing, need high troughput
•VOIP IP phone, small packet low latency
•Distance is 1.5 km, relatively near
33. Hardware to Choose
•Since the distance is near, SXT G 5HnD can handle this kind of situation, troughput maximum theoritical speed is 300 Mbps, and it has gigabit interace
•From real world experiece, real troughput is can achieve 70 Mbps full duplex, with signal strenght -55 dbi
•Nv2 is used to optimize the latency for voip
•We need transparent brigde for vlan trunking, so we can configure VPLS brigde over wireless
34. Need more Troughput
•Change the hardware configuration with higher stadard (802.11ac)
Since the distance is near, reduce TX power to avioid Noise