This document discusses two options for connecting a bank to the internet: single-homing and multi-homing. Single-homing involves connecting to a single internet service provider (ISP) and is cheaper and easier to set up but offers less reliability. Multi-homing connects to multiple ISPs and offers better availability, reliability, and performance through load balancing, but requires more networking skills and expertise. The document recommends most banks start with single-homing and consider upgrading to multi-homing if internet uptime is critical to their operations.
Outline of RIPE Atlas probes to measure Internet connectivity and reachability in real time. Anyone can participate and it is potentially the world's largest Internet measurement network.
ITU-APNIC collaboration on the transition from IPv4 to IPv6APNIC
APNIC Development Director Duncan Macintosh presented on the collaboration activities between the ITU and APNIC on IPv6 capacity development in developing economies at the ICTs for smart, sustainable Asia Pacific in Manila, from 6 to 7 June 2016.
Presentation given by Paul Wilson, Director General APNIC, at the 25th Latin America and Caribbean Network Information Centre Meeting, in Havana, Cuba, 2 to 6 May 2016
Outline of RIPE Atlas probes to measure Internet connectivity and reachability in real time. Anyone can participate and it is potentially the world's largest Internet measurement network.
ITU-APNIC collaboration on the transition from IPv4 to IPv6APNIC
APNIC Development Director Duncan Macintosh presented on the collaboration activities between the ITU and APNIC on IPv6 capacity development in developing economies at the ICTs for smart, sustainable Asia Pacific in Manila, from 6 to 7 June 2016.
Presentation given by Paul Wilson, Director General APNIC, at the 25th Latin America and Caribbean Network Information Centre Meeting, in Havana, Cuba, 2 to 6 May 2016
An Update on Mobility in Today's Internet, by Geoff Huston.
Presented at the APNIC 40 "Internet – Mobility Nexus: Are We Ready for Real Mobile/Wireless Broadband?" session, Wed 9 Sep 2015.
Vivek Nigam and Pubudu Jayasinghe discuss the Internet in Myanmar, IPv4 depletion and how Members can manage that, deploying IPv6, and routing security.
Presented by Elly Tawhai, APNIC Senior Hostmaster, at the 2017 New Zealand Network Operators Group (NZNOG) meeting was held in Tauranga, New Zealand from 26 to 27 January.
Deputy Director General, Sanjaya, outlines Internet infrastructure in Taiwan, demonstrating how the BGP routing table can be used as a data source to visualise Internet infrastructure in an economy by mapping transit paths of Autonomous System Numbers delegated to that economy.
PacNOG 18/APNIC Regional Meeting: AS interconnection and IPv6 measurementAPNIC
Deputy Director General Sanjaya presents on visualizing Ipv6 measurements and AS mapping in the Asia Pacific at PacNOG 18/APNIC Regional Meeting in Guam from 30 Nov to 4 Dec 2015.
Cooperative Communication for a Multiple-Satellite Networkchiragwarty
when it comes to space communication
networks, there are many different kinds of space vehicles
that need to communicate with each other, in space as well
as with ground terminals and air borne platform. Example:
Geosynchronous Earth orbit (GEO), Low Earth Orbit
(LEO) satellites and UAVs. There is an ever growing
demand for higher data rates and minimal redundancy, with
satellites and various space platforms travelling at high
speeds relative to each other and relative to the ground
establishing such links can prove to be a real challenge
when Doppler Effect and line of sight (LOS) can play a
significant role in SONET timing and synchronization. As
the number of users grows the space communication links
need to address several types of coding and modulation.
This paper analyzes the use of cooperative communication
techniques for point-to-point and point-to-multipoint
communication links. To this end we start with a simplified
single relay model and proceed to analyze the multi-node
scenarios. We will then apply the amplify-and-forward,
decode-and-forward and coded cooperation protocols to the
best case scenario to compute the efficiency and
synchronization of the link. The single relay and multi-node
scenarios are evaluated on the basis of the signal to noise
(SNR) power received and inter channel interference (ICI).
The intention is to demonstrate the theoretical performance
by simulating outage probability versus spectral efficiency
for different relaying protocols. Subsequently we will show
the effect of cooperative communication on bandwidth
utilization for mobile satellites and space platforms.
This is a class room presentation taught by Prof Chowdari Prasad to MBA (Banking) students on developments of Technology in Indian Banking. It was well received and needs to be updated. Any suggestions are welcome from bankers, students, researchers, etc.
An Update on Mobility in Today's Internet, by Geoff Huston.
Presented at the APNIC 40 "Internet – Mobility Nexus: Are We Ready for Real Mobile/Wireless Broadband?" session, Wed 9 Sep 2015.
Vivek Nigam and Pubudu Jayasinghe discuss the Internet in Myanmar, IPv4 depletion and how Members can manage that, deploying IPv6, and routing security.
Presented by Elly Tawhai, APNIC Senior Hostmaster, at the 2017 New Zealand Network Operators Group (NZNOG) meeting was held in Tauranga, New Zealand from 26 to 27 January.
Deputy Director General, Sanjaya, outlines Internet infrastructure in Taiwan, demonstrating how the BGP routing table can be used as a data source to visualise Internet infrastructure in an economy by mapping transit paths of Autonomous System Numbers delegated to that economy.
PacNOG 18/APNIC Regional Meeting: AS interconnection and IPv6 measurementAPNIC
Deputy Director General Sanjaya presents on visualizing Ipv6 measurements and AS mapping in the Asia Pacific at PacNOG 18/APNIC Regional Meeting in Guam from 30 Nov to 4 Dec 2015.
Cooperative Communication for a Multiple-Satellite Networkchiragwarty
when it comes to space communication
networks, there are many different kinds of space vehicles
that need to communicate with each other, in space as well
as with ground terminals and air borne platform. Example:
Geosynchronous Earth orbit (GEO), Low Earth Orbit
(LEO) satellites and UAVs. There is an ever growing
demand for higher data rates and minimal redundancy, with
satellites and various space platforms travelling at high
speeds relative to each other and relative to the ground
establishing such links can prove to be a real challenge
when Doppler Effect and line of sight (LOS) can play a
significant role in SONET timing and synchronization. As
the number of users grows the space communication links
need to address several types of coding and modulation.
This paper analyzes the use of cooperative communication
techniques for point-to-point and point-to-multipoint
communication links. To this end we start with a simplified
single relay model and proceed to analyze the multi-node
scenarios. We will then apply the amplify-and-forward,
decode-and-forward and coded cooperation protocols to the
best case scenario to compute the efficiency and
synchronization of the link. The single relay and multi-node
scenarios are evaluated on the basis of the signal to noise
(SNR) power received and inter channel interference (ICI).
The intention is to demonstrate the theoretical performance
by simulating outage probability versus spectral efficiency
for different relaying protocols. Subsequently we will show
the effect of cooperative communication on bandwidth
utilization for mobile satellites and space platforms.
This is a class room presentation taught by Prof Chowdari Prasad to MBA (Banking) students on developments of Technology in Indian Banking. It was well received and needs to be updated. Any suggestions are welcome from bankers, students, researchers, etc.
Education and Training for The Future WorkforceWISE
Are graduates happy with their career options? What skill do they need to be better prepared for future jobs? Is the future of degrees only in the hand of universities?
Sales Hacker Conference San Francisco - Jason Lemkin - The 10 Key Revenue Mis...Sales Hacker
The 10 Key Revenue Mistakes I Made Getting to $100 Million Arr by Jason Lemkin
Sales Hacker Conference San Francisco - November 6, 2014
Visit SalesHacker.com for more sales hacks, tips, and tactics.
APIs have become ubiquitous and they have profoundly changed the way we connect to the world. They have opened the doors to enterprise back-end infrastructure and made it possible for developers to build innovative mobile applications. But this IT revolution comes with its share of challenges. “If we build it they will come” is no longer an effective API launch strategy. AnyPresence and WIP Factory are joining forces to share valuable best practices on improving API adoption.
This presentation describes the technological trends developed to help charities and fund raising organizations overcome the current challenges. The presentation also describes how LINKDev charity solution introduces a competitive advantage to charities by helping them stay current with technological advances
The internet will not scale to support >7Bn people and >50Bn things on line, but Clouds and Networks Without Infrastructure will, and they are neither singular nor static. Clouds are entirely dynamic and multi-modal with; public, private, personal, open, closed, government and commercial clouds that are fixed, mobile, long and short lived, permanent and transitory. In addition the new degrees of freedom that Clouds afford makes them inherently more secure and resilient than any network medium we have created before. But, not all clouds are equal, and neither is all data!
The era of IT Departments providing centralised networking and security is drawing to a rapid close in the same way that sitting in front of a PC in an office all day is becoming unworkable. So, it is time to rethink what has to change in order to adapt to rapidly growing BYOD (Bring Your Own Device) and BMOB (Be My Own Boss) cultures. At the same time, ecological, social, commercial and technology demands are pushing toward more and smaller devices, the tagging and tracking of everything, whilst using less material and energy. This all demands more wireless and new modes of networking demanding more optical fibre especially in the last mile where Point to Point systems will replace the outmoded BPON and GPON technologies of the past. In this symmetric wide bandwidth future there is no place or part to plat by the old copper local loop technologies, and the mobile operators @ 3,4,5G will be further relegated to transporting < 1% of the total traffic of the future connected world. New species of WiFi and BlueTooth will emerge to dominate mobile connectivity and transport with the short range hops to a vastly increased number of fibre fed hot spots in room, on floor, in building, and on campus.
HCLT Whitepaper: Multi- Tenancy on Private CloudHCL Technologies
http://www.hcltech.com/engineering-rd-services/overview~ More on Engineering and R&D
Advances in cloud computing technology and changes in business models create major paradigm shifts in the way software applications are designed, built, and delivered to end users. The concept of multi-tenancy is one of the key and direct derivatives of cloud computing. Multi-tenancy is an architectural model that optimizes resource sharing. The applications will be deployed and delivered from a shared environment while providing sufficient levels of isolation to the tenants and Quality of Service (QoS) throughout the environment. Like any other paradigm shift, a cloud-based delivery (SaaS) model also comes with a new set of technical challenges.
This paper provides a technical overview on how to convert an application traditionally hosted on-premise to a multi-tenant environment and deliver through an SaaS model. This paper also covers the challenges and benefits of moving this to a cloud infrastructure.
Excerpts from the Paper
The advent of cloud computing boosted a new business model for delivering software, which is generally termed SaaS (Software as a Service). ISVs started realizing the necessity of transforming their traditional on-premise products to the new ―cloud business model. Multi-tenancy is the fundamental design approach that essentially improves the acceptability of SaaS applications. The idea of multi-tenancy, or many tenants sharing resources, is fundamental to cloud computing. Isolation and service assurance are the key elements to be addressed. Isolation ensures that the resources of existing tenants remain untouched, and the integrity of the applications, workloads, and data remain uncompromised when the service provider provisions new tenants. Each tenant may have access to different amounts of network, computing, and storage resources in the shared virtual environment. Tenants see only those resources allocated to them.
SITB15 - Qu'est qu'une Data Driven Company à l'heure de la digitalisation ?cyrilpicat
Session jouée au Salon Swiss IT Business le 22 avril 2015
Digitalisation, Big Data, data-driven company : trois buzz words omniprésents dans les stratégies informatiques aujourd'hui, et qui semblent intimement liés. Alors, qu'est qu'une "data driven company" ? Est-ce une entreprise poussant à l'extrême l'utilisation de Big Data afin de se digitaliser ?
Pas seulement... une "data driven company" est une entreprise qui cherche continuellement à améliorer l’ensemble des processus de l’entreprise par l’utilisation qualitative et quantitative de données, tout le temps, partout et sur tout.
Ce sujet nous touche dans notre quotidien, que ce soit au niveau technologique, des processus, de l'organisation, et surtout de la culture, et a des conséquences qui transforment tous les métiers.
Cette session reviendra sur les éléments structurants qui distinguent une data-driven company et détaillera en quoi cette culture peut être un accélérateur de votre stratégie de transformation digitale.
Structure 2014 - The future of cloud computing survey resultsGigaom
Presentation from Gigaom's Structure 2014 conference, June 21-22 in San Francisco
The future of cloud computing survey results
#gigaomlive
More at http://events.gigaom.com/structure-2014/
Review of the key financial benefits of Software-Defined WAN.
Enterprises are seeking to understand the financial benefits of SD-WAN as this new technology continues to grow. Dan Conde, industry analyst at ESG Research, has spent several months researching how SD-WAN is modernizing wide area networks while delivering substantial cost savings.
Join Dan Conde in this webinar to gain a better understanding of the key elements of SD-WAN that deliver performance, simplicity, and optimal access to on-premise applications and cloud services. Dan will examine the components of SD-WAN and provide a review of the key financial benefits, basic cost savings and the hidden operational benefits that SD-WAN brings to businesses.
PCTA 2019: How to obtain Internet resources to join the IXPAPNIC
APNIC Senior Internet Resource Analyst Anna Mulinbayan presents on getting Internet number resources to join the IXP at PCTA 2019 in Manila, Philippines from 2 to 4 April 2019.
Water Service Providers (WSPs) in Kenya face insurmountable challenges due to rising cost of production of clean water. Water treatment chemicals, rising cost of electricity (used to pump water), high UFW (Unaccounted For Water) among other challenges make the water companies operate in a tight cash flow environment.
WSPS have to adopt technologies and strategies that will increase efficiency and reduce the cost of production. Meter reading is an area that the WSPS can use low cost android phones for real time meter reading that will allow the units consumed to be sent real time to the server via GPRS connectivity. They can also use POS that can compute and print instant water bills ad customers can pay for their bills real time using MPESA thus increase the company's cash flow as opposed to waiting till the amount of days taken to produce bills.
The solution can integrate to GPS data in the company for better management reporting tool.
Ready, Set, SD-WAN: Best Practices for Assuring Branch ReadinessThousandEyes
ThousandEyes EMEA webinar run on Tuesday October 29th at 1000 GMT. Presented by Ian Waters, Senior Director of EMEA Marketing and Tim Hale, Senior Solutions Engineer. Covering SD-WAN visibility best practices and featuring a live demo of ThousandEyes monitoring a Cisco Viptela SD-WAN.
Slides from ThousandEyes EMEA webinar on Thursday March 7th 2019 at 1000 GMT. Presented by Ian Waters, Director of Solutions Marketing and Tim Hale, Solutions Engineer. Content focuses on the move of enterprises to SD-WAN technologies and WAN transformation in general.
Cyber Security Practices and Future Plan: Real Scenario in ISPs In Nepal By Samit Jana
President At Nepal Network Operators Group, Samit Jana
For more details: https://ictframe.com/cyber-security-practices-and-future-plan-real-scenario-in-isps-in-nepal/
APNIC Internet Resource Analyst Zen Ng gives a presentation on Your IP, Your Network, to explain the benefits of portable IP addresses from APNIC and discuss future network plans in Lao PDR.
CISCO: Accelerating Small Cell Deployments in the EnterpriseSmall Cell Forum
Mark Grayson, distinguished engineer at CISCO presented on the Small Cell Forum stand at MWC on accelerating small cell deployments within the enterprise zone.
Modernizing the credit approval process in 3 simple steps - Sip and SolveExperian
Modernizing your credit approval process can feel daunting in the beginning stages, but it doesn't have to be. By starting small with some basic automation principals and tips, you can begin to implement change more easily over time in order to drive incremental returns for your business. As you and your stakeholders become more comfortable with these changes and can see the tangible benefits, you can continue to automate more pieces of the process to drive even more value. Eventually, you'll be left wondering why you didn't automate sooner.
Watch the webinar recording here:
https://www.experian.com/business-information/webinar-sip-and-solve-ep-12-modernizing-credit-approval
MMNOG: Internet infrastructure comparisons in the Asia Pacific APNIC
Deputy Director General Sanjaya discusses how different networks within the region interconnect through the examination of different network topologies, and how Myanmar network operators can plan and grow the Internet in their economy at the first Myanmar Network Operators Group.
Similar to Connecting your bank to the Internet (20)
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
Sunny Chendi, Senior Advisor, Membership and Policy at APNIC, presents 'APNIC Policy Roundup' at the 5th ICANN APAC-TWNIC Engagement Forum and 41st TWNIC OPM in Taipei, Taiwan from 23 to 24 April.
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Dave Phelan, Senior Network Analyst/Technical Trainer at APNIC, presents 'DDoS In Oceania and the Pacific' at NZNOG 2024 held in Nelson, New Zealand from 8 to 12 April 2024.
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Geoff Huston, Chief Scientist at APNIC deliver keynote presentation on the 'Future Evolution of the Internet' at the Everything Open 2024 conference in Gladstone, Australia from 16 to 18 April 2024.
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Paul Wilson, Director General of APNIC delivers a presentation on IP addressing and IPv6 to the Policymakers Program during IETF 119 in Brisbane Australia from 16 to 22 March 2024.
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
Tom Harrison, Product and Delivery Manager at APNIC presents at the Registration Protocols Extensions working group during IETF 119 in Brisbane, Australia from 16-22 March 2024
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Che-Hoo Cheng, Senior Director, Development at APNIC presents on the "Benefits of doing Internet peering and running an Internet Exchange (IX)" at the Communications Regulatory Commission of Mongolia's IPv6, IXP, Datacenter - Policy and Regulation International Trends Forum in Ulaanbaatar, Mongolia on 7 March 2024
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
APNIC Senior Advisor, Membership and Policy, Sunny Chendi presented on APNIC updates and RIR Policies for ccTLDs at APTLD 85 in Goa, India from 19-22 February 2024.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1. Issue Date:
Revision:
Connecting your Bank to
the Internet
Strategies and implications
26 June 2014
1.0
Sanjaya
Deputy Director General
sanjaya@apnic.net
2. Overview
• Why connect to the Internet?
• How the Internet works
• 2 different options to connect
• Comparing the advantages and challenges
• Conclusion
3. Why connect?
• As an information/service producer
– Bank website
– Internet banking service
– Online promotions through e-mail, social media etc.
• As an information/service consumer
– News, research and other information source for Bank’s staff
• At the headquarter
• At the branch offices
– Online data source for transaction processing, trend analysis etc.
• Stock market data
• Foreign exchange rates
5. How the Internet works
mobile network
satellite/wireless network
copper/fibre network
Internet backbone
6. How the Internet works
202.150.8.132
202.150.8.99
202.178.112.1
202.178.120.15
AS11167
12.100.1.8
AS24478
AS17726
2401:A700:1::D1
2401:A700:F::E3
2401:3E00:DD::1
2401:3E00:EE::15A
Autonomous System Number (ASN)
IP Address (IPv4)
IP Address (IPv6)
7. How the Internet works
• 3d visualization of all the
networks worldwide that are
interconnected to form the
Internet, including ISPs, Internet
Exchange Points, Universities
and Organization networks
• Each dot represents an ASN
(Autonomous System Number)
• There are 47,000+ ASNs
currently active in the Internet
Source: peer1.com
8. How to connect: option 1
• Single-homing
– One Internet connection per site
• Headquarter
• Data Centre
• Branches
– Use IP addresses from ISP
202.178.112.1
2401:3E00:DD::1
AS24478
9. How to connect: option 2
• Multi-homing
– Multiple Internet connections to
different ISPs and/or exchange
points
– Use Bank’s own ASN and IP
addresses
202.178.112.1
2401:3E00:DD::1
AS52378
10. Comparison
• Single-homing
– Advantages
• Cheaper and easier to setup
• Only need to deal with one ISP
– Challenges
• Availability & reliability
• Performance
• Limited availability of IP address
from the ISP
• Multi-homing
– Advantages
• Better availability and reliability
• Load-balancing & traffic engineering
for improved performance
• Better network scalability
– Challenges
• Networking skill required
11. Conclusion
• Most organizations can start with single homing connection
as it is simple to set up
• Organizations that rely heavily on the Internet to run their
business should consider a multi-homing connection for
better availability, reliability and performance
– Will need to hire a network engineer or get help from a network
integration vendor
– Get their own ASN and IP addresses from APNIC
12. About APNIC
• APNIC (Asia Pacific
Network Information
Centre) is an open,
membership-based, not-
for-profit organization
providing Internet
addressing services to
the Asia Pacific
• We distribute
– ASN
– IPv4
– IPv6
• We operate in 56
economies in AP region