This document discusses Internet Exchange Points (IXPs). It begins with a history of IXPs, explaining how they originated from the need for private networks to interconnect after commercial traffic was restricted on NSFNET. The document then defines IXPs, explaining that they are neutral locations where network operators interconnect their networks to exchange traffic via ethernet switches. It discusses why IXPs are established, including reducing costs and improving performance by keeping local traffic local. Finally, it provides examples of successful IXPs in the Asia-Pacific region and benefits of their creation, such as developing local internet economies.
In This Presentation, Following Topics for PCRF basic, with details of E// SAPC, are clarified and presented.
SAPC definition
Functional View
Service Aware Policy Control
Bearer Resource Control
Cross Control Functions
Information Model and O&M
Platform
Next Generation Service Platforms for Multimedia and Value Added ServicesAli Saghaeian
Some of the topics covered in this slide deck:
VoLTE: A Catalyst for Transformation
VoLTE vs OTT Voice Call
Next Generation Wi-Fi Calling
Consumer Use Cases for VoWiFi
WebRTC value-added services and Telco use-cases
IMS Underpinning for Next-Gen Telco Services
Virtualization evolution and roadmap - the path to NFV
This presentation takes you through an automation Journey from self-healing to #Network #Slicing. It describes the need for orchestration and the service providers’ steps towards automation. It presents Verizon’s customer case of service life-cycle automation, including VNF on-boarding, service design, provisioning and closed loop assurance. Then it explores network slicing including the definition of blueprints and network slice life-cycle management. More information on Ericsson Dynamic orchestration - http;//www.ericsson.com/dynamic-orchestration
For more in depth explanations check out my Blog: http://techneconomyblog.com/2014/05/21/the-abc-of-network-sharingthe-fundamentals-part-i/
Given the renewed discussion of Network Sharing pros and cons I thought it made sense to wrap up several of my older presentations and update some of the information with latest knowledge.
The myth of network sharing is clear -> huge savings and benefits often blinding the decision makers for the other side of the coin.
I hope this presentation provided a fair picture of both sides of the Network Sharing Coin!
The presentation provides more than 10 years of my work and experience since the early days of 3G Network Sharing discussions in 2000 - 2001.
In This Presentation, Following Topics for PCRF basic, with details of E// SAPC, are clarified and presented.
SAPC definition
Functional View
Service Aware Policy Control
Bearer Resource Control
Cross Control Functions
Information Model and O&M
Platform
Next Generation Service Platforms for Multimedia and Value Added ServicesAli Saghaeian
Some of the topics covered in this slide deck:
VoLTE: A Catalyst for Transformation
VoLTE vs OTT Voice Call
Next Generation Wi-Fi Calling
Consumer Use Cases for VoWiFi
WebRTC value-added services and Telco use-cases
IMS Underpinning for Next-Gen Telco Services
Virtualization evolution and roadmap - the path to NFV
This presentation takes you through an automation Journey from self-healing to #Network #Slicing. It describes the need for orchestration and the service providers’ steps towards automation. It presents Verizon’s customer case of service life-cycle automation, including VNF on-boarding, service design, provisioning and closed loop assurance. Then it explores network slicing including the definition of blueprints and network slice life-cycle management. More information on Ericsson Dynamic orchestration - http;//www.ericsson.com/dynamic-orchestration
For more in depth explanations check out my Blog: http://techneconomyblog.com/2014/05/21/the-abc-of-network-sharingthe-fundamentals-part-i/
Given the renewed discussion of Network Sharing pros and cons I thought it made sense to wrap up several of my older presentations and update some of the information with latest knowledge.
The myth of network sharing is clear -> huge savings and benefits often blinding the decision makers for the other side of the coin.
I hope this presentation provided a fair picture of both sides of the Network Sharing Coin!
The presentation provides more than 10 years of my work and experience since the early days of 3G Network Sharing discussions in 2000 - 2001.
A quick look at 5G System architecture in Reference point representation and in Service Based representation and also look at the different Network Functions (NFs) within the 5G System.
In this day and age, it's probably a good idea to get your WLAN ready for voice and video. And it's also a good idea to classify and prioritize web applications based on policies you set. Protecting your mobile devices and network infrastructure against outside or inside attacks needs to be part of the plan, too. Join to us to learn more about these and other functions of Aruba's policy enforcement firewall integrated to its access points, switches, and controllers.
Introduction of PS Core Network Elements and little bit of EPC/LTE Network. This is introductory slides pack for a 10 class/slides set for detail introduction of 2G/3G and LTE PS Core Network.
6G Training Course Part 7: 6G Technologies - Introduction3G4G
After our successful launch of '5G for Absolute Beginners' course (http://bit.ly/5Gbegins) in 2020, we decided to create an introductory training course on 6G Mobile Wireless Communications technology. The course is ready and the best way to navigate it is via the Free 6G Training page at: https://bit.ly/6Gintro - this will ensure that you have the latest version of each video and also the most recent version of the 6G technologies videos as and they are added.
In this part we will look at 6G Technologies. As this is a huge topic, we are only going to discuss the technologies at a very high level. Later on we will create more detailed presentations on 6G technologies. In this part we will look at some of the 6G technologies being proposed by other researchers, organisations, vendors and operators and create a summary of the 6G technologies that are being discussed. These technologies each merit their own little presentation that we hope to make in the future
This course is part of #Free6Gtraining initiative (https://www.free6gtraining.com/)
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
6G and Beyond-5G Page: https://www.3g4g.co.uk/6G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Free 6G Training Blog: https://www.free6gtraining.com/
During this webinar, we will cover AppRF - a suite of application visibility and control features that are part of Aruba's Policy Enforcement Firewall. AppRF is a PEF feature that is designed to give network administrators insight into the applications that are running on their network, and who is using them. Check out the webinar recording where this presentation was used:
https://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Aruba-AppRF-AOS-6-x-amp-8-x/td-p/490800
Advanced: Control and User Plane Separation of EPC nodes (CUPS)3G4G
This presentation looks at Control and User Plane Separation of EPC nodes (CUPS) which was completed by 3GPP as part of Release 14 specifications and is set to be a key core network feature for many operators.
CUPS provides the architecture enhancements for the separation of functionality in the Evolved Packet Core’s SGW, PGW and TDF. This enables flexible network deployment and operation, by distributed or centralized deployment and the independent scaling between control plane and user plane functions - while not affecting the functionality of the existing nodes subject to this split.
Core Network Optimization: The Control Plane, Data Plane & BeyondRadisys Corporation
This presentation takes you through the challenges network operators are facing as they bring in more and more bandwidth-intensive applications to their network. There are ways to optimize the network from the RAN to the Core -- and improve QoS.
A detailed look at what is meant by private networks, why do we need them and why the sudden interest in them. Also discussed is the 3GPP defined 5G Non-Public Networks (NPN), they architecture, implementation, pros and cons. In addition RAN sharing and Campus Networks are also discussed with regards to where they fit in the private networks.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
5G Fixed Wireless Access: Trends we’re seeing and Capgemini’s approachCapgemini
Fixed Wireless Access (FWA) is considered to be the first promising B2C use-case for 5G, offering customers a “fiber-like” experience. Capgemini explores several deployment sceneries, an analysis of Verizon’s 5G Home launch and the momentum it’s causing in the market, as well as the key components that need to be addressed when building a 5G FWA strategy. To learn more about Capgemini Invent’s expertise in 5G, contact our experts:
Pierre Fortier
Principal Consultant, Capgemini Invent
Pierre.Fortier@capgemini.com
Marouane Bikour
Senior Consultant, Capgemini Invent
Marouane.bikour@capgemini.com
During this webinar, we will discuss how starting from ArubaOS 8.2.0.0, selected APs can run in both controller-based mode and controller-less mode and the implications tied to that. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-AP-Discovery-amp-Deployment-Policy-ArubaOS-8-x/m-p/394540/
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
Introducing our 5G Platform for the first movers in 5G, the first completely end-to-end solution that combines core and radio solutions in 5G to enable new opportunities and use cases
Advanced: True Fixed-Mobile Convergence (FMC) with 5G3G4G
A presentation/video looking at how true fixed-mobile convergence will be achieved in 5G. The main motivation for this tutorial is the fact that 5G is designed to enable access-neutral service availability. What this means is that 5G services in future will be available seamlessly not just over 5G NR but also over Wi-Fi and Wireless access networks.
The tutorial discusses:
• Untrusted non-3GPP access networks;
• Trusted non-3GPP access networks (TNAN);
• Wireline access networks;
• Non-5G-Capable over WLAN (N5CW);
• Access Traffic Steering, Switching and Splitting (ATSSS)
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
A quick look at 5G System architecture in Reference point representation and in Service Based representation and also look at the different Network Functions (NFs) within the 5G System.
In this day and age, it's probably a good idea to get your WLAN ready for voice and video. And it's also a good idea to classify and prioritize web applications based on policies you set. Protecting your mobile devices and network infrastructure against outside or inside attacks needs to be part of the plan, too. Join to us to learn more about these and other functions of Aruba's policy enforcement firewall integrated to its access points, switches, and controllers.
Introduction of PS Core Network Elements and little bit of EPC/LTE Network. This is introductory slides pack for a 10 class/slides set for detail introduction of 2G/3G and LTE PS Core Network.
6G Training Course Part 7: 6G Technologies - Introduction3G4G
After our successful launch of '5G for Absolute Beginners' course (http://bit.ly/5Gbegins) in 2020, we decided to create an introductory training course on 6G Mobile Wireless Communications technology. The course is ready and the best way to navigate it is via the Free 6G Training page at: https://bit.ly/6Gintro - this will ensure that you have the latest version of each video and also the most recent version of the 6G technologies videos as and they are added.
In this part we will look at 6G Technologies. As this is a huge topic, we are only going to discuss the technologies at a very high level. Later on we will create more detailed presentations on 6G technologies. In this part we will look at some of the 6G technologies being proposed by other researchers, organisations, vendors and operators and create a summary of the 6G technologies that are being discussed. These technologies each merit their own little presentation that we hope to make in the future
This course is part of #Free6Gtraining initiative (https://www.free6gtraining.com/)
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
6G and Beyond-5G Page: https://www.3g4g.co.uk/6G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Free 6G Training Blog: https://www.free6gtraining.com/
During this webinar, we will cover AppRF - a suite of application visibility and control features that are part of Aruba's Policy Enforcement Firewall. AppRF is a PEF feature that is designed to give network administrators insight into the applications that are running on their network, and who is using them. Check out the webinar recording where this presentation was used:
https://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Aruba-AppRF-AOS-6-x-amp-8-x/td-p/490800
Advanced: Control and User Plane Separation of EPC nodes (CUPS)3G4G
This presentation looks at Control and User Plane Separation of EPC nodes (CUPS) which was completed by 3GPP as part of Release 14 specifications and is set to be a key core network feature for many operators.
CUPS provides the architecture enhancements for the separation of functionality in the Evolved Packet Core’s SGW, PGW and TDF. This enables flexible network deployment and operation, by distributed or centralized deployment and the independent scaling between control plane and user plane functions - while not affecting the functionality of the existing nodes subject to this split.
Core Network Optimization: The Control Plane, Data Plane & BeyondRadisys Corporation
This presentation takes you through the challenges network operators are facing as they bring in more and more bandwidth-intensive applications to their network. There are ways to optimize the network from the RAN to the Core -- and improve QoS.
A detailed look at what is meant by private networks, why do we need them and why the sudden interest in them. Also discussed is the 3GPP defined 5G Non-Public Networks (NPN), they architecture, implementation, pros and cons. In addition RAN sharing and Campus Networks are also discussed with regards to where they fit in the private networks.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
5G Fixed Wireless Access: Trends we’re seeing and Capgemini’s approachCapgemini
Fixed Wireless Access (FWA) is considered to be the first promising B2C use-case for 5G, offering customers a “fiber-like” experience. Capgemini explores several deployment sceneries, an analysis of Verizon’s 5G Home launch and the momentum it’s causing in the market, as well as the key components that need to be addressed when building a 5G FWA strategy. To learn more about Capgemini Invent’s expertise in 5G, contact our experts:
Pierre Fortier
Principal Consultant, Capgemini Invent
Pierre.Fortier@capgemini.com
Marouane Bikour
Senior Consultant, Capgemini Invent
Marouane.bikour@capgemini.com
During this webinar, we will discuss how starting from ArubaOS 8.2.0.0, selected APs can run in both controller-based mode and controller-less mode and the implications tied to that. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-AP-Discovery-amp-Deployment-Policy-ArubaOS-8-x/m-p/394540/
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
Introducing our 5G Platform for the first movers in 5G, the first completely end-to-end solution that combines core and radio solutions in 5G to enable new opportunities and use cases
Advanced: True Fixed-Mobile Convergence (FMC) with 5G3G4G
A presentation/video looking at how true fixed-mobile convergence will be achieved in 5G. The main motivation for this tutorial is the fact that 5G is designed to enable access-neutral service availability. What this means is that 5G services in future will be available seamlessly not just over 5G NR but also over Wi-Fi and Wireless access networks.
The tutorial discusses:
• Untrusted non-3GPP access networks;
• Trusted non-3GPP access networks (TNAN);
• Wireline access networks;
• Non-5G-Capable over WLAN (N5CW);
• Access Traffic Steering, Switching and Splitting (ATSSS)
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Александр Ильин, технический директор MSK-IX «Высокоскоростной обмен тр...ARCCN
- Что такое пиринг? Принципы взаимодействия автономных сетей в интернет
- Роль точек обмена трафиком Internet eXchangе (IX) в пиринговой экосистеме
- Масштабирование, отказоустойчивость и безопасность для разделяемой сети коммутации: особенности архитектуры и сервисов MSK-IX:
- От обмена трафиком к обмену идеями — мероприятия MSK-IX для профессионального сообщества.
Discussion of cybersecurity opportunities and challenges and how APNIC can assist with RPKI, DNSSEC, and BCP 38 implementation to help secure the Internet's infrastructure.
The slides present a possible evolution of Internet Exchanges toward InterCloud Exchanges.
Comparable issues within two models are explained. Moreover what TOP-IX has started doing to converge to new model.
How Can Businesses Benefit from an Internet Exchange?cyrusone
As a physical infrastructure, an Internet Exchange (IX) allows different networks to exchange Internet traffic. Various Internet Service Providers (ISPs), content providers and others delivering services over IP interconnect directly through an exchange instead of through third-party networks. Learn more about an Internet Exchange by visiting http://www.cyrusone.com/.
GRX is the global private network where telecom network operators exchange GPRS roaming traffic of their users. It’s also used for all M2M networks where roaming is used, and that is the case from some company’s truck fleet management system down to intelligence GPS location spybug tracking system.
GPRS has been there from 2.5G GSM networks to the upcoming LTE Advanced networks, and is now quite widespread technology, along with its attacks. GRX has had a structuring role in the global telecom world at a time where IP dominance was beginning to be acknowledged. Now it has expanded to a lightweight structure using both IP technologies and ITU-originated protocols.
In this presentation, we’ll see how this infrastructure is protected and how it can be attacked. We’ll discover the issues with specific telco equipment inside GRX, namely GGSN and SGSN but also now PDN Gateways in LTE and LTE Advanced “Evolved Packet Core”. We will see the implications of this with GTP protocol, DNS infrastructure, AAA servers and core network technologies such as MPLS, IPsec VPNs and their associated routing protocols. These network elements were rarely evaluated for security, and during our engagements with vulnerability analysis, we’ve seen several vulnerabilities that we will be showing in this speech.
We will demo some of the attacks on a simulated “PS Domain” network, that it the IP part of the Telecom Core Network that transports customers’ traffic, and investigate its relationships with legacy SS7, SIGTRAN IP backbones, M2M private corporate VPNs and telecom billing systems. We will also seem how automation enable us to succeed at attacks which are hard to perform and will show how a “sentinel” attack was able to compromise a telecom Core Network during one penetration test.
Developing RESTful Web APIs with Python, Flask and MongoDBNicola Iarocci
Presented at EuroPython 2012. The abstract: "In the last year we have been working on a full featured, Python powered, RESTful Web API. We learned quite a few things on REST best patterns, and we got a chance to put Python’s renowned web capabilities under review, even releasing a couple Open Source projects in the process. In my talk I will share what we learned. We will consider ‘pure’ REST API design and its many hurdles. We will look at what Python as to offer in this field and finally, we will dig further down by looking at some of the code we developed. Some of the technologies/stacks I’ll cover are (in no particular order): Flask, PyMongo, MongoDB, REST, JSON, XML, Heroku. Did you know? Like it or not, there is going to be a REST API in your future."
People are the Media (DDB Edmonton Edition)Eric Weaver
EDMONTON, AB, CANADA - April 28, 2010 - This is a revised edition of the keynote I gave at the Microsoft Social Media 201 Conference, with updates for DDB Edmonton clients.
AUDIENCE: Marketers, advertisers, brand managers
OPPORTUNITY: To rethink traditional approaches to marketing to leverage both traditional AND social means, to create engagement, influence and activation, rather than mere "awareness" or conversation.
BGP Multihoming Techniques, by Philip Smith.
A presentation given at APRICOT 2016’s BGP Multihoming Techniques (Part 1 and 2) sessions on 24 February 2016.
APNIC Training Delivery Manager for SEA and SA, Shane Hermoso, presents on the importance of peering and IXPs at the Women in Networking series on 17 November 2021
APNIC Training Delivery Manager Terry Sweetser presents an overview of Internet Exchange Points at PacNOG 31, held in Port Vila, Vanuatu from 26 to 30 June 2023.
PITA 27th AGM & Business Forum Expo 23: Internet Exchange PointsAPNIC
APNIC Training Delivery Manager Terry Sweetser presented on smarter networking and Internet traffic efficiency with Internet Exchange Points at the PITA 27th AGM & Business Forum Expo 23, held from 29 May to 1 June 2023, in Port Moresby, Papua New Guinea.
PacNOG 25: Keeping local traffic local by doing local peering APNIC
APNIC Infrastructure and Development Director Che-Hoo Cheng presented on 'Keeping Local Traffic Local by Doing Local Peering'. about the concepts of peering, the benefits of peering, and the roles of Internet exchange Points (IXPs) to facilitate easier local peering. Che-Hoo also shared his experience in operating an IXP.
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Che-Hoo Cheng, Senior Director, Development at APNIC presents on the "Benefits of doing Internet peering and running an Internet Exchange (IX)" at the Communications Regulatory Commission of Mongolia's IPv6, IXP, Datacenter - Policy and Regulation International Trends Forum in Ulaanbaatar, Mongolia on 7 March 2024
PTC'14 Presentation by Steve Wilcox: “The Role IXPs and Peering Play in the E...Nicole White
Presentation given by Stephen Wilcox, CEO of IX Reach at PTC'14, entitled “The Role IXPs and Peering Play in the Evolution of the Internet”.
Excerpt:
"There are over 400 Internet Exchange Points distributed across the world, and growing. The largest and most successful reside in Europe and play a vital role in the growth and evolution of the Internet. There are over 50 IXPs in Europe alone, most promoting local traffic exchange but only a handful recognised as international hubs for interconnections. These particular IXPs continue to increase their value added services and expand globally - most recently to the US - promoting their non-for-profit and neutral business models in varying and emerging markets. This recent expansion makes it all the more important to consider the role IXPs and peering play in the continuing evolution of the Internet and how network operators should approach peering in a network blend.
The reciprocal interplay between Tier 1, 2 and 3 networks over IXPs, particularly those with an international focus, has become an interesting addition to the global Internet topology, enabling networks to reduce their costs and the Internet to grow in-line with end-user demand for high-bandwidth content and mobile usage. However, given 99.5% of peering agreements are completed on a hand shake, and the majority are settlement-free, scenarios such as de-peering can still occur, leading to partial Internet black-outs and events such as these need to be taken into consideration when building redundancy into a network.
This industry briefing will discuss the most common ways different networks value and utilise IXPs in their network blend, what to consider when choosing peering locations, why some participate at an IXP while others do not, and the de-peering scenarios that can occur and the impact this can have on a network's service. It will also touch on the geographical positioning of major IXPs and the trends in peering partners by selected countries."
Taufik kurniawan one small step to private cloud infrastructure an end user...teknologiinformasi
Loosely Coupled Tightly Integrated Approach
Loosely coupled our infrastructure resources (networks, servers and storages) then tightly integrated them with open standard technology to get the most benefit private cloud infrastructure.
Less vendor lock-in / more flexible to vendor choice
More Efforts to implement and to operate and maintain
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
Sunny Chendi, Senior Advisor, Membership and Policy at APNIC, presents 'APNIC Policy Roundup' at the 5th ICANN APAC-TWNIC Engagement Forum and 41st TWNIC OPM in Taipei, Taiwan from 23 to 24 April.
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Dave Phelan, Senior Network Analyst/Technical Trainer at APNIC, presents 'DDoS In Oceania and the Pacific' at NZNOG 2024 held in Nelson, New Zealand from 8 to 12 April 2024.
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Geoff Huston, Chief Scientist at APNIC deliver keynote presentation on the 'Future Evolution of the Internet' at the Everything Open 2024 conference in Gladstone, Australia from 16 to 18 April 2024.
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Paul Wilson, Director General of APNIC delivers a presentation on IP addressing and IPv6 to the Policymakers Program during IETF 119 in Brisbane Australia from 16 to 22 March 2024.
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
Tom Harrison, Product and Delivery Manager at APNIC presents at the Registration Protocols Extensions working group during IETF 119 in Brisbane, Australia from 16-22 March 2024
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
APNIC Senior Advisor, Membership and Policy, Sunny Chendi presented on APNIC updates and RIR Policies for ccTLDs at APTLD 85 in Goa, India from 19-22 February 2024.
Lao Digital Week 2024: It's time to deploy IPv6APNIC
APNIC Development Director Che-Hoo Cheng presents on the importance of deploying IPv6 at the Lao Digital Week 2024, held in Vientiane, Lao PDR from 10 to 14 January 2024.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
2. Internet Exchange Points
p Background – What is an IXP
p Why set up an IXP?
p Technologies
p Benefits
p IXPs in Asia Pacific region today
2
3. A bit of history
Where did the IX concept come
from?
3
4. A Bit of History…
p NSFnet – one major backbone
n US “National Science Foundation” funded
n Connected academic & research institutions
n Also connected “private company” networks, with
acceptable use policy
p AUP: No commercial activity
n Three Network Access Points (NAPs): Chicago, New
York, San Francisco
p Private companies needed to interconnect their
networks
n Requirement to send “commercial traffic”
n Could not cross NSFnet
n Resulted in the early “commercial Internet Exchanges” 4
5. More History…
p Early Internet Exchanges created in early 90s
n CIX-West – west coast USA
n MAE-East – east coast USA
n D-GIX – Stockholm
p End of the NSFnet in 1995:
n Meant move towards commercial Internet
n Private companies selling their bandwidth
n ANS (operator of the late NSFnet) had to join IXes
5
6. Even more History
p D-GIX formed in Stockholm in 1992
n Three major ISPs interconnected
n Latency reduction, performance gains
n Local traffic stays local
p LINX formed in London in 1994
n Five UK operators interconnected
n Latency reduction, performance gains
n Local traffic stays local
p HKIX formed in Hong Kong in 1995
n Vibrant Internet community, many small operators
n Latency, performance, and local traffic benefits
p Also AMS-IX in Amsterdam in 1994
n Same reasons as others 6
7. Internet Exchange Point
p What:
n A neutral location where network operators freely
interconnect their networks to exchange traffic
p What is the physical IX:
n An ethernet switch in a neutral location
p How does it work:
n IX Operator provides the switch and rack space
n Network Operators bring routers, and interconnect them
via the IX fabric
p Very simple concept – any place where providers
meet to exchange traffic
7
8. Internet Exchange Point
p Layer 2 exchange point
n Ethernet (100Gbps/10Gbps/1Gbps/100Mbps)
n Older technologies used in the past included
ATM, Frame Relay, SRP, FDDI and SMDS
p Layer 3 exchange point
n Has historical status now
n Router based
p Best known example was CIX-West
p Router and management very quickly overwhelmed
by the rapid growth of the Internet
8
9. Why an Internet
Exchange Point?
Saving money, improving QoS,
Generating a local Internet
economy
9
10. Internet Exchange Point
Why peer?
p Consider a region with two ISPs
n Each provides internet connectivity to their
customers
n Each has one or two international connections
to the rest of the Internet
p How does traffic from a customer of one
ISP get to the customer of the other ISP??
n Via the international connections
n Expensive, high latency, congested
10
11. Internet Exchange Point
Why peer?
p The two competing ISPs peer with each
other
p Outcome/Benefits:
n Both save money
n Local traffic stays local
n Better network performance, better QoS,…
n More international bandwidth for expensive
international traffic
n Everyone is happy
11
12. Internet Exchange Point
Why peer?
p A third ISP enters the equation
n Becomes a significant player in the region
n Local and international traffic goes over their
international connections
p The three ISPs agree to peer
n To save money
n To keep local traffic local
n To improve network performance, QoS,…
n Which means they buy circuits to each other – won’t
scale
p Solution: Internet Exchange Point
n Each participant buys just one link, to the IXP
12
13. Internet Exchange Point
p Solution:
n Every ISP participates in the IXP
n Cost is minimal – one local circuit covers all domestic
traffic
n International circuits are used for just international
traffic – and backing up domestic links in case the IXP
fails
p Result:
n Local traffic stays local
n QoS considerations for local traffic is not an issue
n RTTs are typically sub 1ms
n Customers enjoy the Internet experience
n Local Internet economy grows rapidly
13
14. Who can join an IXP?
p Requirements are very simple: any organisation
which operates their own autonomous network,
and has:
n Their own address space
n Their own AS number
n Their own transit arrangements
p This often includes:
n Commercial ISPs
n Academic & Research networks
n Internet infrastructure operators (eg Root/ccTLDs)
n Content providers
n Broadcasters and media
n Government Information networks 14
15. When is an IXP not required?
p Legislation: When there is one legislated
monopoly transit provider
n With all other network operators legislated to be
customers of this monopoly provider
p Geography: When the local economy is so small
that it cannot sustain more than one network
operator
n Very small nations (maybe less than 10000 population?)
n Sparsely populated / remote areas
15
16. When an IXP is “not required”
p This is still the situation in several countries
around the world
p Usually it is a Government operated “national
telco”
n ISP licence mandates connecting to “national telco” for
Internet services
p Implications:
n Expensive domestic connectivity
n Expensive international connectivity
n Restricted and poor service offerings
n No domestic Internet economy
16
18. IXP Design
p Very simple concept:
n Ethernet switch is the interconnection media
p It must be a managed switch
p It must have decent security features
p The IXP is one LAN (Layer 2)
p https://www.euro-ix.net/ixp-wishlist has more details
n Each ISP brings a router, connects it to the
ethernet switch provided at the IXP
n Each ISP peers with other participants at the
IXP using BGP
18
20. Layer 2 Exchange
p Two switches for redundancy
p ISPs use dual routers for redundancy or
loadsharing
p IXP offers services for the “common good”
n Internet portals and search engines
n DNS Root & TLDs, NTP servers
n Content Caches
n Routing Registry and Looking Glass
20
21. Layer 2 Exchange
p Neutral location
n Anyone can install fibre or other connectivity media to
access the IXP
p Without cost or regulations imposed by location
p Secure location
n Thorough security, like any other network data centre
p Accessible location
n Easy/convenient for all participants to access
p Expandable location
n IXPs result in Internet growth, and increasing space
requirements
21
22. Layer 2 Exchange
p Operation:
n Requires neutral IXP management
n “Consortium”
p Representing all participants
p “Management Board” etc
p Funding:
n All costs agreed and covered equally by IXP participants
n Hosting location often contributes – the IXP brings them
more business
p Availability:
n 24x7 cover provided by hosting location
p Managed by the consortium
22
23. Layer 2 Exchange
p Industry Standards documented by Euro-IX, the
European IXP Association
n Contributed to by the Euro-IX members
p IXP BCP
n General overview of the infrastructure, operations,
policies and management of the IXP
n https://www.euro-ix.net/ixp-bcp
p IXP Website BCP
n https://www.euro-ix.net/website-bcp
23
24. Types of Peering
p Mandatory Multi-Lateral Peering (MMLP)
n Each participant is forced to peer with every other
participant as part of their IXP membership
n Has no history of success — the practice is strongly
discouraged
p Multi-Lateral Peering (MLP)
n Each participant peers with every other participant
(usually via a Route Server)
p Bi-Lateral Peering
n Participants set up peering with each other according to
their own requirements and business relationships
n This is the most common situation at IXPs today
24
25. Types of Operator Peering Policies
p Open Peering
n Where an ISP publicly states that they will peer with all
parties who approach them for peering
n Commonly found at IXPs where ISP participates via the
Route Server
p Selective Peering
n Where an ISP’s peering policy depends on the nature of
the operator who requests peering with them
n At IXPs, operator will not peer with RS but will only peer
bilaterally
p Closed Peering
n Where an ISP decides who its peering partners are, and
is generally not approachable to creating peering
opportunities 25
26. Operators Peering Activities
p The Peering Database documents ISPs peering
policies and contact information
n http://peeringdb.com
p All operators of ASNs should register in the
peeringdb
n All operators who are considering peering or are peering
must be in the peeringdb to enhance their peering
opportunities
p Participation in peering fora is encouraged too
n Global Peering Forum (GPF)
n Regional Peering Fora (European, Middle Eastern, Asian,
Caribbean, Latin American)
26
27. Charging
p IXPs needs to be run at minimal cost to its
member participants
p Common examples:
n Datacentre hosts IX for free
n IX operates cost recovery – most common
n Different pricing for different ports – biggest IXPs
p IXes do NOT charge for traffic crossing the switch
fabric
n They are a peering enabler, encouraging as much traffic
as possible between members
27
29. IXP Creation
p No economy or circumstance is unique or
different
n The first excuse for not creating an IXP is “we don’t
need one”
n The second excuse for not creating an IXP is “oh, it is
different here”
p Every locality has its differences
n But every locality wants to
p Keep local traffic local
p Improve network performance and QoS
p Improve local Internet economy
n The available technology is the same for every network
operator everywhere
n There is no excuse for not improving the local Internet 29
30. Eco System Development
p Create IXP association
n Formed by members who have a port on the IXP
p IXP members meet regularly
n IXP Board meetings
n IXP Operational strategy and direction
p IXP Technical community could also meet too
n Network operators meeting, involving network and
systems operations engineers
n Aligned with IXP Association/member meetings
n Could lead to creation of a Network Operators Group
p IXP could facilitate the creation of a NOG
n The same engineers are involved in both!
30
31. Industry Associations
p Euro-IX
n European Internet Exchange association
n Members from Europe, associate members from around
the world
n Website has all the information needed to start an IXP
n https://www.euro-ix.net/starting-an-ixp
n IXP Best Practice documentation:
n https://www.euro-ix.net/euro-ix-bcp
p APIX
n Asia Pacific Internet Exchange association
n Members from Asia Pacific region
n Meets twice a year, during APRICOT and APNIC meeting
n http://apix.asia 31
32. More about IXPs and ISP interconnects
p Network Startup Resource Center
n http://nsrc.org/route-bgp-ixp.html
p Internet Society
n http://www.internetsociety.org/what-we-do/issues/
internet-exchange-points-ixps
n http://www.ixptoolkit.org/
p Telegeography
n http://www.telegeography.com/telecom-resources/
internet-exchange-map/
n A collection of ISP interconnect points
p Note Well: many of these are NOT IXPs
32
33. Summary
p IXP is a Layer 2 infrastructure
p At least three players required (two is okay too)
n Meeting in an open and neutral location
p Minimal rules
p Minimal bureaucracy
p Cost recovery
p Encourage participation by all autonomous
networks
p Develop the local Internet eco-system
33
35. Success stories
p Vanuatu IX (VUIX)
n Launched in 2013, and all network operators in
Vanuatu participate
n First open neutral IXP in the Pacific
n Has caused a lot of interest in neighbouring
Pacific nations, especially Papua New Guinea
and Fiji
n The recent PacNOG in Vanuatu included visit to
the IX facility
35
36. Success stories
p Nepal IX (NPIX)
n Launched in 2002
n Within first year, most ISPs in Nepal connected
n Incumbent followed a few years later
n Very effective at keep local traffic local
p Bangladesh IX (BDIX)
n Launched in 2004
n Connecting many of the small and mid-sized providers in
and around Dhaka
p Now Bhutan is looking at an IXP for the industry
there
36
37. Other IXPs in the region
p Hong Kong (HKIX)
p Japan IXPs
n JPNAP, JPIX, WIDE’s IX,…
p New Zealand’s IXPs
n Auckland, Christchurch,…
p Western Australia (WAIX)
p Singapore (SGIX)
p Thailand’s first Open Neutral IXP being
established
37
38. The future
p Ultimately each economy requires an IXP
n Open and neutral, free for all operators to
connect to and exchange traffic
n Keeps local traffic local
n Improves domestic internet performance
n Improves local internet economy (attracting
content and content development back home)
n Very attractive for content providers and
content distribution providers
38