Telekom Malaysia has been deploying IPv6 to address the exhaustion of IPv4 addresses and to realize the national goal of a dual-stack nation by 2015. The deployment began with tunneling over the existing IPv4 backbone and providing some customer and peering connections in IPv6. Key phases included introducing IPv6 into the new IP core and broadband services and supporting IPv6 in services like VPN and mobile. Challenges include that only 28% of customer premises equipment supports IPv6 and that dual-stack does not fully address the IPv4 exhaustion issue.
IPv6 deployment architecture for broadband access networksAPNIC
At CommunicAsia 2016, Training and Technical Assistance Manager Nurul Islam discussed the design option for IPv6 in a broadband access network and the impact that IoT will have on this in order to support future growth.
Presentació a càrrec de Maria Isabel Gandia, cap de Comunicacions, duta a terme a la comunitat usuària de LAC-IX (Latin America and Caribbean IXPS) el 30 d'abril de 2021 en format virtual.
IPv6 deployment architecture for broadband access networksAPNIC
At CommunicAsia 2016, Training and Technical Assistance Manager Nurul Islam discussed the design option for IPv6 in a broadband access network and the impact that IoT will have on this in order to support future growth.
Presentació a càrrec de Maria Isabel Gandia, cap de Comunicacions, duta a terme a la comunitat usuària de LAC-IX (Latin America and Caribbean IXPS) el 30 d'abril de 2021 en format virtual.
IPv6 Success Stories– Network Operators Tell All!
Asela Galappattige (Sri Lanka Telecom); Senevi Herath (LEARN); Patrick Okui (Network Startup Resource Center); Matsuzaki Yoshinobu (IIJ)
In this session, we invite network operators to share their IPv6 success stories and lessons learned along the way that can help other managers of networks deploy IPv6. How did they do it? What technical, organizational, and political challenges did they face? Attendees will gain vital insight as network operators lay out the stages for IPv6 implementation—creating the business case for management buy-in, initiating a planning process, flipping the switch, and, finally, gathering measurements and proving success.
HKNOG 10.0: 30 Years of Internet in HK – A Quick Look Back at the First 20 YearsAPNIC
APNIC Infrastructure and Development Director Che-Hoo Cheng remembers the first 20 years of the Internet at HKNOG 10.0, held online on 10 September 2021.
464XLAT Tutorial, by Masataka Mawatari.
Presented at the APNIC 40 "Hypes? Fanfares? Fads? Wading through the muddy IPv6 puddle" session, Wed 9 Sep 2015.
BGP: Whats so special about the number 512?GeoffHuston
It was reported that parts of the Internet crashed when the number of routes in the Internet's Inter-domain routing table (BGP) exceeded 512K routes. This presentation looks at the growth of the Internet's routing table and how this correlates to the capacity and speed of memory in hardware routers.
Xerrada a càrrec de Paolo Lucente, de NTT Communications, sobre el BGP Monitoring Protocol (BMP), prèvia a la reunió número 44 de la Comissió Tècnica del CATNIX del 2 de juliol de 2021.
IPv6 Deployment in China, by Jessica Shen.
A presentation given at the APNIC 40 IPv6 Readiness Measurement BoF and APIPv6TF session on Wed, 9 Sep 2015.
Agenda
1. SGIX and Internet Exchange Points (IXPs)
2. iDA iN2015 Master Plan
3. NBN and its Development
4. Cost of Circuits
5. iDA Licenses
6. The future: SmartNaQon (HetNet) and 4th Telco
This presentation will talk about the past and future Infocomm Development Authority of Singapore (iDA) master plans and how they shaped Singapore Internet landscape. The objective is to give Indonesian companies a brief understanding on the situation and regulations in Singapore.
IPv6 Success Stories– Network Operators Tell All!
Asela Galappattige (Sri Lanka Telecom); Senevi Herath (LEARN); Patrick Okui (Network Startup Resource Center); Matsuzaki Yoshinobu (IIJ)
In this session, we invite network operators to share their IPv6 success stories and lessons learned along the way that can help other managers of networks deploy IPv6. How did they do it? What technical, organizational, and political challenges did they face? Attendees will gain vital insight as network operators lay out the stages for IPv6 implementation—creating the business case for management buy-in, initiating a planning process, flipping the switch, and, finally, gathering measurements and proving success.
HKNOG 10.0: 30 Years of Internet in HK – A Quick Look Back at the First 20 YearsAPNIC
APNIC Infrastructure and Development Director Che-Hoo Cheng remembers the first 20 years of the Internet at HKNOG 10.0, held online on 10 September 2021.
464XLAT Tutorial, by Masataka Mawatari.
Presented at the APNIC 40 "Hypes? Fanfares? Fads? Wading through the muddy IPv6 puddle" session, Wed 9 Sep 2015.
BGP: Whats so special about the number 512?GeoffHuston
It was reported that parts of the Internet crashed when the number of routes in the Internet's Inter-domain routing table (BGP) exceeded 512K routes. This presentation looks at the growth of the Internet's routing table and how this correlates to the capacity and speed of memory in hardware routers.
Xerrada a càrrec de Paolo Lucente, de NTT Communications, sobre el BGP Monitoring Protocol (BMP), prèvia a la reunió número 44 de la Comissió Tècnica del CATNIX del 2 de juliol de 2021.
IPv6 Deployment in China, by Jessica Shen.
A presentation given at the APNIC 40 IPv6 Readiness Measurement BoF and APIPv6TF session on Wed, 9 Sep 2015.
Agenda
1. SGIX and Internet Exchange Points (IXPs)
2. iDA iN2015 Master Plan
3. NBN and its Development
4. Cost of Circuits
5. iDA Licenses
6. The future: SmartNaQon (HetNet) and 4th Telco
This presentation will talk about the past and future Infocomm Development Authority of Singapore (iDA) master plans and how they shaped Singapore Internet landscape. The objective is to give Indonesian companies a brief understanding on the situation and regulations in Singapore.
Presentation during my study at UniKL BMI.
Lecturer: Sir. Roy [https://www.facebook.com/azroy.arman]
Thank you Sir, you are so dedicated and caring lecturer ever.
TM as a Malaysia number 1 Information Communication Technologies provider. We have provide the Internet services, Communication Services, Web Hosting, and other Business Solution Packages.
Help your new leaders achieve success in their new roles by learning the Best Practices for Onboarding New Leaders. You'll learn the phases and objectives of the new leader's first 90 days, as well as the Best Practicess to follow. Research has shown that almost half of all new leaders will fail in their role within the first 18 months. Don't let that happen to you or your leaders. Follow the best practices for onboarding new leaders in this presentation to set you and your leaders on the path to success!
UK Spectrum Policy Forum - Dave Cullen - Fixed Wireless Access/TransporttechUK
UK Spectrum Policy Forum
Cluster 1 - 30 June 2015
Dave Cullen, Board Member, INCA
Fixed Wireless Access/Transport
More information at: http://www.techuk.org/about/uk-spectrum-policy-forum
All rights reserved
Analysis of WiMAX regulation in South Korea and Indonesia - PresentationLaili Aidi
Abstract—The development and rollout of WiMAX introduces several regulatory and policy issues. This paper highlights the WiMAX Regulation in South Korea, as a country that is already more mature and had become the first to implement Wireless Broadband Access (WBA) of its kind (WiBro) in the world, and Indonesia, as a country that is still in the process of formulating the reconcilable regulation. The paper begins with a brief overview of the technologies behind WiMAX and compared the market situation relative to broadband and 3G mobile networks. Next, the paper examines the potentially significant specific policy and regulatory issues for regulator in each country and competition climate between stockholders. Finally, this data was used to obtain recommendations to overcome the said problems. We found out that WiMAX may prove to be a disruptive technology for existing telecommunication and Internet sector, but careful policy effectuation can ensure that the disruption could create the maximum benefit possible in the society and market.
---
Please contact trough lailiaidi at gmail.com for download request
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
Sunny Chendi, Senior Advisor, Membership and Policy at APNIC, presents 'APNIC Policy Roundup' at the 5th ICANN APAC-TWNIC Engagement Forum and 41st TWNIC OPM in Taipei, Taiwan from 23 to 24 April.
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Dave Phelan, Senior Network Analyst/Technical Trainer at APNIC, presents 'DDoS In Oceania and the Pacific' at NZNOG 2024 held in Nelson, New Zealand from 8 to 12 April 2024.
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Geoff Huston, Chief Scientist at APNIC deliver keynote presentation on the 'Future Evolution of the Internet' at the Everything Open 2024 conference in Gladstone, Australia from 16 to 18 April 2024.
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Paul Wilson, Director General of APNIC delivers a presentation on IP addressing and IPv6 to the Policymakers Program during IETF 119 in Brisbane Australia from 16 to 22 March 2024.
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
Tom Harrison, Product and Delivery Manager at APNIC presents at the Registration Protocols Extensions working group during IETF 119 in Brisbane, Australia from 16-22 March 2024
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Che-Hoo Cheng, Senior Director, Development at APNIC presents on the "Benefits of doing Internet peering and running an Internet Exchange (IX)" at the Communications Regulatory Commission of Mongolia's IPv6, IXP, Datacenter - Policy and Regulation International Trends Forum in Ulaanbaatar, Mongolia on 7 March 2024
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
APNIC Senior Advisor, Membership and Policy, Sunny Chendi presented on APNIC updates and RIR Policies for ccTLDs at APTLD 85 in Goa, India from 19-22 February 2024.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
2. ABOUT TM
@PTCouncil
#PTC17
28,008
Number of Employees
2.34
Million fixed
broadband customers
4
Million PSTN customers
migrated to NGN
269,905
Million mobile
subscribers
53%
Of Malaysian households
use TM’s broadband infrastructure
3,200
>Kilometer / Over domestic
fibre core trunk and junction
19
Point-of-Presence (POP)
worldwide
100
Over 1Pv6 peerings worldwide
3. @PTCouncil
#PTC17
The Journey
• Tunnel over existing
IPv4 backbone
• Few customer &
peering connections
•Completed
Compliance
Audit Phase #2
by MCMC
• In the new IP Core, PE
routers are dual-stack &
terminate customer
circuits while core routers
remain in IPv4 MPLS
• Completed Compliance
Audit Phase#1 by MCMC
• APNIC’s announcement
on IPv4 exhaustion
• Completed Compliance
Audit Phase #3 by MCMC
• First IPv6 Commercial
services for LL/Transit
•Roll out of IPv6
compatible
modem/RG
• Rollout dual-
stack
broadband
services
• Completed compliance
audit by MCMC on IPv6
broadband
• Support for IPv6 in VPN
services
•Support for
IPv6 Mobile
service on
Mobile & Wifi
4. @PTCouncil
#PTC17
The Importance of Deploying IPv6
TM has already started running out of IPv4 address thus transition to IPv6
has to happen
To realize the national aspiration for dual-stack nation by end of 2015
As broadband champion and leading ICT service provider, TM has to set the
landscape
IPv6 opens up endless new possibilities for IoT
8. @PTCouncil
#PTC17
Challenges
Only 28% of CPE is currently using IPv6.
Customers may be using their own CPE, non-IPv6 compatible (older
models) or simply disabled IPv6
Dual-stack does not address IPv4 exhaustion
Application behavior with dual-stack