This document summarizes MyIX, the Malaysia Internet Exchange. It discusses how MyIX improves internet efficiency in Malaysia by keeping local traffic local rather than routing it internationally. It outlines MyIX's growth, operations, services, and plans to further enrich connectivity. MyIX hosts an annual peering event called Peering Asia to encourage interconnection in the Asia Pacific region.
Agenda
1. SGIX and Internet Exchange Points (IXPs)
2. iDA iN2015 Master Plan
3. NBN and its Development
4. Cost of Circuits
5. iDA Licenses
6. The future: SmartNaQon (HetNet) and 4th Telco
This presentation will talk about the past and future Infocomm Development Authority of Singapore (iDA) master plans and how they shaped Singapore Internet landscape. The objective is to give Indonesian companies a brief understanding on the situation and regulations in Singapore.
Many carriers and ISPs deliver the redundancy by using the "dynamic protocol" such as BGP, OSPF.
On this presentation, BBIX team introduces how to arrange the redundancy on the layer2 network as the IX provider.
Parallel Wireless is reimagining LTE for public safety to provide control, coverage, and resilience for first responders. Learn more about our public safety LTE deployments at http://www.parallelwireless.com
C-RAN, Cloud RAN Training | Tonex TrainingBryan Len
C-RAN, sometimes referred to as Centralized-RAN, is an architecture for cellular networks.
C-RAN is a novel versatile network architecture that can address various challenges administrators face while attempting to help developing end-client's needs.
C-RAN (cloud radio access network) is a centralized, cloud computing-based architecture for radio access networks (RAN) that empowers
Enormous scale arrangement
Collaborative radio technology backing
And genuine time virtualization capabilities.
C-RAN benefits include :
The ability to pool resources
Reuse infrastructure
Simplify network operations and management
Support multiple technologies
Reduce energy consumption, lower capex and opex
Network becomes more heterogeneous and self-organizing.
Learn about:
BU (Base Band Unit)
RRH (Remote Radio Head)
CPRI (Common Public Radio Interface) Link and Protocol
C-RAN vs. macro cells and DAS (Distributed Antenna Systems)
Request more information.
Visit tonex.com for course and workshop detail
C-RAN Training | Cloud-RAN Training
https://www.tonex.com/training-courses/c-ran-training-cloud-ran-training/
Presentació a càrrec de Maria Isabel Gandia, cap de Comunicacions, duta a terme a la comunitat usuària de LAC-IX (Latin America and Caribbean IXPS) el 30 d'abril de 2021 en format virtual.
Agenda
1. SGIX and Internet Exchange Points (IXPs)
2. iDA iN2015 Master Plan
3. NBN and its Development
4. Cost of Circuits
5. iDA Licenses
6. The future: SmartNaQon (HetNet) and 4th Telco
This presentation will talk about the past and future Infocomm Development Authority of Singapore (iDA) master plans and how they shaped Singapore Internet landscape. The objective is to give Indonesian companies a brief understanding on the situation and regulations in Singapore.
Many carriers and ISPs deliver the redundancy by using the "dynamic protocol" such as BGP, OSPF.
On this presentation, BBIX team introduces how to arrange the redundancy on the layer2 network as the IX provider.
Parallel Wireless is reimagining LTE for public safety to provide control, coverage, and resilience for first responders. Learn more about our public safety LTE deployments at http://www.parallelwireless.com
C-RAN, Cloud RAN Training | Tonex TrainingBryan Len
C-RAN, sometimes referred to as Centralized-RAN, is an architecture for cellular networks.
C-RAN is a novel versatile network architecture that can address various challenges administrators face while attempting to help developing end-client's needs.
C-RAN (cloud radio access network) is a centralized, cloud computing-based architecture for radio access networks (RAN) that empowers
Enormous scale arrangement
Collaborative radio technology backing
And genuine time virtualization capabilities.
C-RAN benefits include :
The ability to pool resources
Reuse infrastructure
Simplify network operations and management
Support multiple technologies
Reduce energy consumption, lower capex and opex
Network becomes more heterogeneous and self-organizing.
Learn about:
BU (Base Band Unit)
RRH (Remote Radio Head)
CPRI (Common Public Radio Interface) Link and Protocol
C-RAN vs. macro cells and DAS (Distributed Antenna Systems)
Request more information.
Visit tonex.com for course and workshop detail
C-RAN Training | Cloud-RAN Training
https://www.tonex.com/training-courses/c-ran-training-cloud-ran-training/
Presentació a càrrec de Maria Isabel Gandia, cap de Comunicacions, duta a terme a la comunitat usuària de LAC-IX (Latin America and Caribbean IXPS) el 30 d'abril de 2021 en format virtual.
APNIC Training Delivery Manager for SEA and SA, Shane Hermoso, presents on the importance of peering and IXPs at the Women in Networking series on 17 November 2021
KINX - Korea Internet Neutral eXchange - is the only carrier-neutral IX in South Korea and specializes in Internet infrastructure. KINX provides Internet Data Center (IDC), Content Delivery Network (CDN) and Cloud computing services. For more information, please contact our sales group (email: sales@kinx.net, tel: +82-2-526-0957)
APNIC Internet Resource Analyst Zen Ng gives a presentation on Your IP, Your Network, to explain the benefits of portable IP addresses from APNIC and discuss future network plans in Lao PDR.
Javier Benitez's talk from the 2017 Open Networking Summit.
Colt is transforming the way they do business and offer network services to customers through the adoption of SDN & NFV as part of a company-wide transformation program called Novitas. Javier Benitez will focus in this presentation on active Colt’s Novitas developments, sharing with the audience their experience in deploying SDN & NFV solutions in production both for Ethernet and IP services, the learning associated as well as their future plans. In particular, Javier Benitez will cover Colt developments around Ethernet & IP on Demand, SD VPN, SDN controlled MPLS packet core and SDN/NFV NNI standardization.
Presentation from Networkshop46.
GÉANT, by Mian Usman, GÉANT.
Campus network refresh, by David Stockdale, Imperial College London.
Multicast QUIC for video content delivery, by Richard Bradbury, BBC Research & Development.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
2. 1
Peering without Local Internet Exchange: traffic
goes out & comes back in (“Boomerang”)
Global
Internet
Downstream Customers Downstream Customers
MY ISP-A MY ISP-B
3. 2
Internet Traffic Model “Boomerang”
(In the absence a Local Internet Exchange) is inefficient
Hong Kong
Kuala Lumpur
Shah Alam
Colorado
1
2
3
1 2 3
Kuala Lumpur Colorado Hong Kong Shah Alam
The local traffic is re routed
internationally before reaching its
destination (Boomerang Effect)
TMNet AS4788
SingTel AS7473
Maxis AS9543
Time AS9930
MIX Jaring AS2400
DiGi AS4818
Hutchison
AS9304
Verio AS2914 Verizon AS701Teleglobe/VSNL AS6453
International carriers
4. 3
With a Local Internet Exchange, domestic
traffic is routed locally and is efficient
Global
Internet
Downstream Customers Downstream Customers
MY ISP-A MY ISP-B
MYIX
5. 4
MyIX brings savings & quality to industry
Keeps domestic traffic within a country/region
without having to take indirect international
route “ keep local traffic local”
Savings on International bandwidth and IP
transit costs
Improved throughput and latency performance
Better user experience
Economies of scale
6. 5
MyIX was formed with MCMC support
Malaysia Internet Exchange (MyIX) established in
September 2006
Seeding fund from MCMC (2006-2010)
Support from regulator, MCMC
Neutral, 1st Internet Exchange in Malaysia
National Internet Exchange
Operated by Persatuan Pengendali Internet
Malaysia
Managed by Elected Committee (bi-annually in
Annual General Meeting)
7. 6
Operating for industry benefit
Non-profit, Self sustainable since 2011
Income
§ Membership fee
§ Port fee
Expenses
§ Network infrastructure, support, services
§ Co location
§ Regional Nodes
§ Administration
Surplus
§ Own office ( purchased in 2015 )
§ Value added services for members ( training, forum, portal )
§ Network upgrades ( 2013, 2016, 2019 )
8. 7
MyIX is managed by an elected Committee;
Members (2018-2020) listed below
Chairman AIMS Data Centre Sdn Bhd
Deputy Chairman Maxis Broadband Sdn Bhd
Secretary YTL Communications Sdn Bhd
Assistant Secretary
REDtone Engineering & Network
Services Sdn Bhd
Treasurer MyKRIS Asia Sdn Bhd
Committee Members
Telekom Malaysia Bhd
TT dotCom Sdn Bhd
DiGi Telecommunications Sdn Bhd
Celcom Axiata Bhd
10. 9
Point of Presence
Menara AIMS, KL
CX1, Cyberjaya
Iskandar Puteri Data Centre, Johor
Setia Commercial Centre, Kuching
11. 10
MyIX today is well connected and recognized
regionally by key internet players
100 different networks connected
~412 Gbps Peak traffic (May 2019)
Supports both IPv4/IPv6 dual stack
4000 IPV4, ~ 100 IPV6
As part of good internet ecosystem, foreign players
have set presence since 2010 (to date total is 26)
We have almost all the top International content
providers (Google,Facebook,Alibaba,Amazon..)
“Entire Malaysian Market is connected”
(Cloudflare, TPIX Peering Forum 2017)
12. 11
We plan to enrich connectivity and
services
Collaborate with Asia Pacific Network
Information Centre (APNIC) for training
Review peering policy & port charges to attract
International & Regional players
Peering Forum/Conference to bring experts to
share knowledge related to industry
Invite more content providers
Value added services ie tools & reporting
13. 12
Value Added Services
Looking Glass, F-Root, I-Root DNS, PCH
Route Server (Bird, Version 1.6.3)
ü Support BGP Community
ü Black holing
Portal for members/peers
ü List of peering member info (IP, ASN,NOC contact)
ü View port utilization
ü View peering traffic (top inbound/outbound)
ü View historical utilization
ü Prefixes Management
14. 13
Training in collaboration with APNIC
8-10 October, 2019
IPv6 Deployment
Course Outline
• Internet Fundamentals
• IPv6 Protocol architecture and standards
• IPv6 Enhancements to Routing Protocols
• IPv6 addressing and address planning
• IPv6 transition technologies
• IPv6 deployment planning
• Enabling IPv6 on network services (DNS, WWW)
• IPv6 security issues
Estimated cost, RM 550 for APNIC members
Subsidize members
15. 14
Network upgrade to cater for growth
Replace Brocade MLXe-8 with Juniper
QFX10008
Increase 1/10 port density per module
Increase 100G port density per module
To complete the migration by end of August
16. 15
Peering Asia
An open and neutral peering event in Asia
Pacific Region (APAC)
To encourage, promote peering and
interconnection in APAC
It is open to people in not only Asia Pacific but
all over the world, who are involved with
peering and interconnection in network service
providers, internet exchange providers, data
centers, and so on
17. 16
Peering Asia
Peering Asia 1.0, 2017, Kyoto, Japan
Peering Asia 2.0, 2018, Hong Kong
Peering Asia 3.0, 2019, Kuala Lumpur, Malaysia
Nov 6-7, Hotel Intercontinental, KL
Hosted by MyIX and MyNOG
Registration is open
Encourage peering coordinators especially local to
attend
Networking with global peering coordinators
18. Thank You !
For enquiries, please contact us at
peering@myix.my