Explains the difference of PVDTN-STS with present connectivity methods; explains the security vulnerability of all VPN (MPLS or otherwise) networks used for MAN / WAN connectivity. The key to the system is the Secure Switch ( a 3 position, electromechanical, microprocessor driven, RJ45 switch) and the STS system covered by letter of patent 262590, which facilitates segregation at LAN level, simultaneous presence on the Internet through the public or Web server, and exchange of publishable information / data and mail between the internal and external networks without impairing the security of the former.
Installing and Troubleshooting MeshDynamics Wireless Mesh Networks. Guidelines on network deployment, antenna selection, range calculations etc. See also MeshDynamics Layout Design and Best Practices Presentations.
A review study of handover performance in mobile ipIJCNCJournal
The Mobile Internet Protocol (Mobile IP) is an extension to the Internet Protocol proposed by the Internet
Engineering Task Force (IETF) that addresses the mobility issues. In order to support un-interrupted
services and seamless mobility of nodes across the networks (and/or sub-networks) with permanent IP
addresses, handover is performed in mobile IP enabled networks. Handover in mobile IP is source cause of
performance degradation as it results in increased latency and packet loss during handover. Other issues
like scalability issues, ordered packet delivery issues, control plane management issues etc are also
adversely affected by it. The paper provides a constructive survey by classifying, discussing and comparing
different handover techniques that have been proposed so far, for enhancing the performance during
handovers. Finally some general solutions that have been used to solve handover related problems are
briefly discussed.
Installing and Troubleshooting MeshDynamics Wireless Mesh Networks. Guidelines on network deployment, antenna selection, range calculations etc. See also MeshDynamics Layout Design and Best Practices Presentations.
A review study of handover performance in mobile ipIJCNCJournal
The Mobile Internet Protocol (Mobile IP) is an extension to the Internet Protocol proposed by the Internet
Engineering Task Force (IETF) that addresses the mobility issues. In order to support un-interrupted
services and seamless mobility of nodes across the networks (and/or sub-networks) with permanent IP
addresses, handover is performed in mobile IP enabled networks. Handover in mobile IP is source cause of
performance degradation as it results in increased latency and packet loss during handover. Other issues
like scalability issues, ordered packet delivery issues, control plane management issues etc are also
adversely affected by it. The paper provides a constructive survey by classifying, discussing and comparing
different handover techniques that have been proposed so far, for enhancing the performance during
handovers. Finally some general solutions that have been used to solve handover related problems are
briefly discussed.
UNIT II MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPVLSICS Design
This paper presents the performance evaluation of router based on code division multiple access technique (CDMA) for Network-on-Chip (NoC). The design is synthesized using Xilinx Virtex4 XC4VLX200 device. The functional behavior is verified using Modelsim XE III 6.2 C. The delay and throughput values are obtained for variable payload sizes. Throughput-Power and Delay-Power characteristics are also verified for NoC.
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
UNIT II MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPVLSICS Design
This paper presents the performance evaluation of router based on code division multiple access technique (CDMA) for Network-on-Chip (NoC). The design is synthesized using Xilinx Virtex4 XC4VLX200 device. The functional behavior is verified using Modelsim XE III 6.2 C. The delay and throughput values are obtained for variable payload sizes. Throughput-Power and Delay-Power characteristics are also verified for NoC.
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
Blueprint for Increasing Worker Ownership in Low-Income Communities Ricardo Nuñez
"How to replicate a regional approach to economic development through the lens of cooperative ownership."
This presentation was given by Project Equity, the Sustainable Economies Law Center (SELC), and the Green Collar Communities Clinic (GC3) of the East Bay Community Law Center (EBCLC) on March 31st, 2015.
Zeta by @HashDashDigital via #hshdsh - From Storytelling to Branding Pallab Kakoty
Mobile responsive is key & driven by social ready optimizers hand coded perfectly to map longitude latitude of locations via Google Maps & verifying business via Bing Places for Business.
Parallax scrolling contextual incites & strategic storyline content ensures visitors with better conversion for repeat visits so that you are ready to drive an interactive enlivening user experience design.
Emotive storytelling fixated by possessive content line to chalk profits that withstand tides of demands channelled by constantly evolving technology. Better be up for it in not less than six months if not more and you will soon see brighter side of your green.
With hash dash digital, grass is greener on both ends!
Simply hash tag #hshdsh for feed or visit website www.hshdsh.com/onepage/
The Internet Revolution has come.The Internet is getting back to its's origin i.e. connecting networks.This Presentation is a small effort to contribute towards the Internet of Things community and hence to the people who are going to make this world a better and a smart planet.In short I'm Enabling Everything to Talk!
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKSijwmn
Enhanced Diversity and Network Coding (eDC-NC), the synergistic combination of Diversity and modified Triangular Network Coding, was introduced recently to provide efficient and ultra-reliable networking with near-instantaneous fault recovery. In this paper it is shown that eDC-NC technology can efficiently and securely broadcast messages in 5G wireless fog-computing-based Radio Access Networks (F-RAN). In particular, this work is directed towards demonstrating the ability of eDC-NC technology to more efficiently provide secure messages broadcasting than standardized methods such as Secure Multicasting using Secret (Shared) Key Cryptography, such that the adversary has no ability to acquire information
even if they wiretap the entire F-RAN network (except of course the source and destination nodes). Our results show that using secure eDC-NC technology in F-RAN fronthaul network will enhance secure broadcasting and provide ultra-reliability networking, near-instantaneous fault recovery, and retain the
throughput benefits of Network Coding
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKSijwmn
Enhanced Diversity and Network Coding (eDC-NC), the synergistic combination of Diversity and modified Triangular Network Coding, was introduced recently to provide efficient and ultra-reliable networking with near-instantaneous fault recovery. In this paper it is shown that eDC-NC technology can efficiently and securely broadcast messages in 5G wireless fog-computing-based Radio Access Networks (F-RAN). In particular, this work is directed towards demonstrating the ability of eDC-NC technology to more efficiently provide secure messages broadcasting than standardized methods such as Secure Multicasting
using Secret (Shared) Key Cryptography, such that the adversary has no ability to acquire information even if they wiretap the entire F-RAN network (except of course the source and destination nodes). Our results show that using secure eDC-NC technology in F-RAN fronthaul network will enhance secure broadcasting and provide ultra-reliability networking, near-instantaneous fault recovery, and retain the throughput benefits of Network Coding.
The NGN (next generation network) initiative -why? and who benefits? It has not proved to be a success. The world should carry on with the present mixed networks of TDM and IP with media gateways to interface between the two.
Shows cost comparison of MPLS and p2p leased line networks, and busts the myth that MPLS networks are cheaper. On the contrary it is more expensive than p2p leased line networks.
Explains how the PVDTN-STS may be used to build secure State WANs and integrated National WAN with e- and m-governance through public portals connected to the Internet, but without impairing the security of the SWANs and NWAN.
Explains how all VPN networks (MPLS or otherwise) are built over Telephone Service Providers (TSPs) IP Core networks, and why they are security vulnerable.
Shows the format in which the location-wise details of the organisations are required to be furnished for network design and set-up and running costs. Additional inputs of organisations' total telecom and datacom costs, and also present cost of inter-locational travel will help in providing the payback period of the set-up costs.
This document shows how point-to-point leased lines are built over the public PSTN / TDM networks and how it ensures the segregation of these from the public network. These lines ensure that MAN / WAN built with such lines are automatically segregated from the external network (integrated)
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
2. B. THE TECHNOLOGY ON OFFER
1. PVDTN-STS is a path-breaking patented,
integrated, inter-locational connectivity
solution which ensures
a. 100% security of an organisation’s
internal databases and WAN
computing against external (hacker)
and internal (mole) threats. It is the
only such solution in the world today
b. Save 50 to 75% of the organisation’s
present telecom costs
c. Save a substantial portion of the
organisations travelling costs, through
multiple simultaneous net meetings for
different work groups with their officers
from their respective work places
spread across the country and the
world
d. The savings in these costs would
generally pay back the network re-
engineering or new set-up cost in 1 to
3 years. The more the inter-locational
communications, the quicker the
payback.
3. c. The system would improve the
organisation’s operational efficiency.
2. PVDTN – STS system is covered by the
following letters of patent and pending
applications.
a. For PVDTN
i. Letter of Patent 202674
ii. Fresh application 1156 / KOL /
2014 DATED 11.11.2014
covering the enhancements.
b. For STS
i. Letter of patent 262590
ii. Fresh application 1158 / KOL /
2014 dated 11.11.2014 covering
improvements
3. To understand this path breaking
technology it is necessary to first
understand the present method of Inter-
locational and Internet connectivity.
Kindly see Fig 1 which shows this
connectivity.
4. INTERNET
INTRANET
P2P LL
NETWORK
OR
MPLS VPN
FIREWALL
DB1 DB2
LAN Nodes
PS
Fig. 1
PRESENT METHOD OF
INTERNET CONNECTIVITY
DB1, DB2, Internal databases of organisation
MS Company mail server
PS Public Server of Company
Single LAN DBs and MS are placed inside the Firewall
PS is placed outside the Firewall or in the DMZ
However, since all Firewalls are breakable the
internal data bases are vulnerable to hacker
attacks
MS
5. INTERNETPVDTN WAN
IBN
2IBN
1
INTRANET LAN INTERNET LAN
STS
SS
OD
2
SS
OD
1
SSA
Fig. 2
PROPOSED METHOD OF
INTERNET CONNECTIVITY
LAN Nodes
VDS
DB2 CS
IS
PSDB1
VDS
CS – Company Communications Server
PS – Company Web or Public Server
IS – Intermediate Server which relays
information / data / mail back and forth
Between CS & PS.
SSA – Automatic Secure Switch which
connects IS to INTRANET and Internet
LAN buses alternately in preset
(adjustable) time.
DB1, DB2 – Company’s internal
databases.
IBN1, IBN2 – Internet Browsing Nodes
SSOD1, SSOD2 – On-demand Secure
Switch.
STS – Total Secure transfer system
comprising of CS, IS, PS and SSA
6. Normally
closed relay
contact
Normally
open relay
contact
R2
R1
MC2
RJ45
socket for
connecting
to Internet
LAN Switch
RJ45
socket
for
connecti
ng to
Interme
diate
Server
LAN
Card
RJ45
socket for
connecting
to Company
secure
LAN Switch
MICRO CONTROLLER LOGIC
MC1
12V DC
Serial Port
9 Pin D Type
R1
R2
Normally
closed relay
contact
Normally
open relay
contact
R2
R1
MC2
RJ45
socket for
connecting
to Internet
LAN Switch
RJ45
socket
for
connecti
ng to
Interme
diate
Server
LAN
Card
RJ45
socket for
connecting
to Company
secure
LAN Switch
MICRO CONTROLLER LOGIC
MC1
12V DC
Serial Port
9 Pin D Type
R1
R2
Fig 3
Schematic Diagram of Secure Switch (SS)
3-Position, Electromechanical, Micro-controller
driven RJ45 switch
8. 4. As may be seen from Fig.1 in the present
method of connectivity, there is a single LAN
switch with a Firewall. The internal databases
and the network are kept within the firewall
domain. The public or company server PS is
kept outside the Firewall or the Demilitarised
Zone (or DMZ).
5. However, as it is now widely accepted all
Firewalls are breakable. Thus in the
arrangement shown in Fig. 1 hackers /
crackers coming in from the Internet can
snoop and spoof through the Firewall system
and access the Internal Databases, which are
vulnerable to hacking.
6. Information from the internal network is
passed on to the Web server (PS) and the
reverse is also true, observing the rules of the
Firewall. So there is free flow of information
back and forth between the internal and
external network.
7. The connectivity arrangement of this new
technology is shown in Fig. 2. In this case
there is a physical separation between the
private (INTRANET) and the public (Internet)
networks
9. 8. The exchange of information between the
public and private networks, i.e. between
the organisation’s communication server
(CS) connected to the INTRANET LAN,
and its public or Web server (PS)
connected to the Internet LAN takes place
through the Intermediate Server (IS) which
is connected to the Automatic Secure
Switch (SSA). SSA alternately connects IS
to INTRANET LAN and Internet LAN, never
to both together, at a settable frequency.
9. Hence there is no direct connection
between the two LANs. Hence hackers /
crackers coming through the Internet will be
confined to the Internet LAN only and will
have access to the PS only like the rest of
the public and gain access to all the
publishable information of the organisation,
and nothing more than that.
10. All LAN nodes on the INTRANET LAN will
be able to transact internal mail through
their Company Mail Server on the same
LAN, and external mail through the STS
system and the Internet Mail Gateway
available on the PS connected to the
Internet LAN.
10. 11. However, there will be some people in the
organisation who will need to browse the
Internet for information and for viewing vendor
and competitor Web sites and other search
engines. For such people Internet Browsing
Nodes (IBNs) will be provided.
12. This network segregation has been made
possible by the secure switch which is a three
position, electromechanical, microcontroller
driven RJ45 switch the schematic diagram of
which is shown in Fig. 3, and the pictorial
views in Fig. 4. This product is covered by the
STS patent No.262590 held by Pankaj Kumar
Mitra, and developed, and owned by
MIDAUTEL
13. Fig. 5 shows how a PVDTN WAN is
configured with point-to-point (p2p) leased
lines between peripheral locations and the
central location with cross linking between
adjacent locations for alternate routing in a tri-
node configuration.
14. Fig. 6 shows the principle of a PVDTN WAN.
Each p2p line has a channel splitter at either
end which split the total bandwidth and create
two parallel networks – a circuit switched
network routed by EPAXs with E&M trunks,
and an IP packet switched network routed by
data routers at each location.
11. 15. Fig.7 shows a typical PVDTN NODE
structure at each company location.
16. Fig.8 shows the MAN network structure of
large multi-office organisations in the same
city, such as Govt. Offices, and Banks. This
forms part of the enhanced PVDTN system
covered by the new patent application dated
11.11.2014.
17. Fig. 9 shows a typical multi-tier PVDTN
WAN configuration, following the principle
explained in Fig.6 and note B 14 above.
18. Fig. 10 shows a typical single-tier PVDTN
WAN using the same principle.
19. Fig. 11 shows the concept of the tri-node
configuration followed in all WAN design.
20. Fig. 12 shows the IP Core schematic of a
TSP (telephone service provider).
21. Fig. 13 shows how all services at a location
are connected to this IP Core through the
Tier 1 switch at the location.
22. It also shows that all public domain networks
have a continuous physical access to each
other, and also to the routers of the VPN
routers supported by this common IP Core.
12. X
Y
X+Y
X+Y
MAX (X,Y)
PVDTN WAN
IPPN
SPLITTER
pSTN
IPPN
SPLITTER
pSTN
+
+PVDTN =
NODE 2
NODE 1
PVDTN Principle
p2p leased line
Circuit Switched pSTN (private switched telephone network routed by EPAXs
at each location
Packet Switched IPPN (IP private network) routed by data routers
at each location
Fig. 6
Fig. 5
13. From Delhi
From Nagpur
From Mumbai
From Chennai
V
D
P
S
Digital n x 64 KBPS
Leased Lines
Analogue
Leased Lines
From locations in same city
or outstation location
Trunk line cards KDI
Voice / fax cards KVF.8
Data cards KHS.2 / KLS.1
Tel
Modem
LCE 2W E&M
Fax
LAN BUS
Server
LAN Nodes
IP RouterCircuit switch router
LINE SPLITTER – KM2100
Residential Connection
Fig. 7
PVDTN NODE ARCHITECTURE AT KOLKATA
NOTE: In Kolkata there are no 4WE&M analogue lines terminating on the VDPS
trunk cards. However, these have been shown so that the analogue
connection at Mumbai from Ahmedabad and at Delhi from the CG Cell may
be understood.
2WE&M lines shown will be present in all locations for residential
connections.
14. S1
S4 S5
S3 S2
LAN BUS
LAN Nodes
Redundant dark
fibre connections
OFC / UTP
Converters
L1
L2L3
L4 L5
UNIFYING SWITCHES AND LANS
USING DARK FIBRE CONNECTIONS
AT KOLKATA
TO FACILITATE SINGLE ROUTING POINT
FOR IP AND CIRCUIT SWITCHED WANS
Modem
LCE 2W E&M
Residential Connection /
Gram Panchayat Connection
Fig 8
17. KOLKATA
3
3
3 3 33
2 2
2
2
2 11
1
1
1
1
4
4
4 4
4
4
4
4
4 4 4
4
4
4
4
4
4
4
TYPICAL STATE WAN CONFIG
USING PVDTN
FOR INTEGRATED VOICE, FAX, DATA COMMUNICATIONS
UP TO GRAM PANCHAYAT
WITH 100% ALTERNATE ROUTING / REDUNDANCY
4 MBPS
2 MBPS
768 KBPS
384 KBPS
2 X 128 KBPS
2 X 2WE&M
1
11
62.42 KBPS
6.22 KBPS
320.7 KBPS
1958.6 KBPS 4 MBPS
2 MBPS
8
8
8
8
8 8
8 8
8
8
8
8
8
8
8
8
8
8
4
4
4
4
4
4
4
4
4
NOTE : Total number of trunks emanating from Kolkata is 144 (8 x 18). Using the Erlang loading
norm this can serve 1152 extensions in Kolkata. Thus 1158 officers may be provided NET
telephones and they may be spread across Writers’ Building, New Secretariat, and the Secretariats
at Salt Lake
6
3
6 6
6
6
3
3
Fig. 9
7
3
4
3
3
6
3
2
Chandigarh
Delhi
Gurgaon
Mumbai
Hyderabad
Kolkata
IHC
Bangalore
227.2
KBPS
140.64
KBPS
300.40
KBPS
118.48
KBPS
120.96
KBPS
120.96
KBPS
110.64
KBPS
103.76
KBPS
192 KBPS
256 KBPS
128 KBPS
512 KBPS
320 KBPS
Fig. 10
CII – PVDTN
WIDE AREA NETWORK TOPOLOGY
6
6
5
6
3
3
3
9
9 4
6
X
Y
X + Y
X + Y
A
B
C
MAX (X,Y)
Fig 4Fig.11
TRITRI--NODE FORMATIONNODE FORMATION
IN PVDTNIN PVDTN
USED FOR SINGLE AND MULTIUSED FOR SINGLE AND MULTI --TIER NETWORKSTIER NETWORKS
1. X and Y are the total bandwidth impinged on the WAN at each location
at A and B respectively. This includes bandwidth for data, speech, and
fax communications.
2. The derivation of X and Y at each location is shown inTable Iof our
draft proposal presentation.
3. The link bandwidth calculations are shown inTable IIof draft proposal
presentation. As shown above the main links AC and BC will havea
total bandwidth of X + Y. This is to take care of 100% alternaterouting
in case of failure of either AC or BC links.
4. The cross link AB will have the larger of the two bandwidths X,Y.
5. We hope this will help you to understand the basis of derivationof
location and link bandwidths shown in our draft proposal presentation.
X
Y
X + Y
X + Y
A
B
C
MAX (X,Y)
FigFi
TRITRI--NODE FORMATIONNODE FORMATION
IN PVDTNIN PVDTN
USED FOR SINGLE AND MULTIUSED FOR SINGLE AND MULTI --TIER NETWORKSTIER NETWORKS
1. X and Y are the total bandwidth impinged on the WAN at each location
at A and B respectively. This includes bandwidth for data, speech, and
fax communications.
2. The derivation of X and Y at each location is shown inTable Iof our
draft proposal presentation.
3. The link bandwidth calculations are shown inTable IIof draft proposal
presentation. As shown above the main links AC and BC will havea
total bandwidth of X + Y. This is to take care of 100% alternaterouting
in case of failure of either AC or BC links.
4. The cross link AB will have the larger of the two bandwidths X,Y.
5. We hope this will help you to understand the basis of derivationof
location and link bandwidths shown in our draft proposal presentation.
18. Pune
NIB – II
TOPOLOGY
Kolkata
Guwahati
Lucknow
Chattisgarh
Bhopal
Jaipur
Gandhinagar / Ahmedabad
Chandigarh
Shimla
Srinagar
Kolkata
Delhi
IGW
IGW
IGW
IGW
IGW
IGW
IGW
IGW
Mumbai
BRAS
H-bad
BRAS
Pondicherry
Chennai
Thiruvanthapuram
Ernakulam
Mumbai
Chennai
Bangalore
Bangalore
Noida
CORE Router
BRAS
STM16
STM1
EDGE Router
Goa
Noida
Patna
Bhubaneshwar
Back Office facilities – Web hosting,
Customer servers, Messaging, Caching,
Billing, etc.
Fig.12
19. NIB – II
ARCHITECTURE
CORE ROUTER
TIER I
EDGE ROUTERS EDGE ROUTERS
EDGE ROUTERS
EDGE ROUTERS
TIER II TIER II
TIER II TIER II
TIER IITIER II TIER II
TIER II TIER II
TIER II
DSLAMs
DSLAMs
BRAS BRAS BRAS BRAS
EDGE ROUTERS
Leased Lines from VPN Subscriber Premises
MPLS VPN
EDGE ROUTER
EDGE ROUTERS
NATIONAL INTERNET
EXCHANGE
TO CONNECT
ALL ISPs AND PROVIDE
COMMON
INTERNATIONAL
GATEWAY
NIEX
EDGE ROUTER
Fig. 13
EDGE ROUTERS
RAS
PSTN NETWORK
TO OTHER CORE ROUTERS
DIAL – UP
CONNECTIONS
DIAL – UP
SERVICE
EDGE
ROUTER
20. Explanatory Motes on VPN Vulnerability
Fig.12 shows the topology of a typical ISP’s IP network over which
both Internet and VPN services are laid out. This is the topology of
BSNL’s NIB – ii. Five cities are connected in a full mesh
connectivity to form the core IP back-bone across India. Other
cities are connected through tri-node rings from the nodes of the
core network through the Tier-1 switch at these nodes.
Fig. 13 shows the architecture of each of these nodes. The core router
at the node sits on the Tier 1 switch. From these switches are
taken the router connections for all the services – VPN, Internet
through Broadband and PSTN. Thus you will note that there is
continuous physical connectivity between all the routers in this IP
network through the Tier 1 switch at each IP Node (POP). Thus
there is continuous public domain access to the VPN routers.
1. In any IP network, public or private, the WAN ports of all routers in
the network have continuous physical access to each other. Thus
while a router port is engaged in communication with another in the
network, a third port can have simultaneous communications with
it. If the IP network is in the public domain (Internet) or has access
from the public domain (VPN), this third port could be that of a
hacker.
2. Thus while the various security protocols like IP Sec, etc., can
transport the data from one computer to another securely, the LAN
and the data bases residing on it are exposed to public domain
through a VPN which has public domain access for reasons
explained in 1 above.
3. For secure WAN computing it is necessary to have a real private
network (at least for data communications). Once this is there then
inter-locational voice / fax can be run over this network at marginal
increase in the operating cost, using the patented PVDTN
system.
4. You should not expose your company data bases to the public
domain through Internet, ISDN back-up, or VPN (which has public
domain access) for reasons explained earlier in 1 above.
5. The MPLS networks currently in vogue are another form of VPN
network and are subject to the comments in 1 to 4 above.
We do hope the above notes will explain the security vulnerability of
your data bases when these are on LANs connected to VPN
(MPLS or other wise) of any service provider.
If you wish to secure your data bases 100% then use point-to-
point leased lines for inter-locational computer connectivity.
21. ADDITIONAL INFRASTRUCTURE FOR PVDTN
AT CENTRAL LOCATION
EPABX
LAN
INTERNET
LAN
VDPS
LAN
INTRANET
LAN
PSTN
INTERNET
PVDTN
WAN
CS
IBN
PS
Secure Switch
Channel
splitter
Existing infrastructure
Additional infrastructure
IS
SS
SS
22. ADDITIONAL INFRASTRUCTURE FOR PVDTN
AT OTHER LOCATION
EPABX
LAN
INTERNET
LAN
VDPS
LAN
INTRANET
LAN
PSTN
INTERNET
PVDTN
WAN
IBN
Channel
splitter
Existing infrastructure
Additional infrastructure
SS
IBN
SS
23. The voice to non-voice (fax and data)
communications cost ratio varies as under
based on statistics collected for various MLOs
(multi-locational organisations across the
world.
80:20 for the most developed countries
95:5 for developing countries
97:3 for less developed countries
Since for the same unit of time 60 times more
information can be transported as data the
Volume ratio would look like
80:1200 for the most developed countries
95:300 for developing countries
97:180 for less developed countries
There is one other ratio the inter-locational (or
intra-company) communications costs to total
communication costs. This could vary from
about 40% for small and less inter-active
MLOs (multi-locational organisations) to
80 to 90% for large and highly inter-active
MLOs.
FAQ 1
How are savings made in PVDTN?
24. Thus if the total communication (voice and data)
costs of a company like yours is X the cost of
voice communications will be around 95% and
that of data around 5%. The integrated voice-
data intra-net will carry only the inter-locational
voice traffic and the total data traffic which is
mostly internal. Even external email will be
passed through this network to be conveyed to
the internet gateway through the STS system.
The total cost of inter-locational communication
of a company is = T + D, where T is the inter-
locational telephony and fax cost and D is the
data communications cost. In this case T will be
say 0.8 x 0.95 X = 0.76 X ; and data com cost
will be 0.05 X.
What PVDTN does is that it eliminates T, by
adding a percentage of D to D. Thus in place
of T+D as you have now, for inter-locational
communications costs, you will have D + d ( a
percentage of D) for total inter-locational
communications costs with PVDTN. Further
presently T varies with increased usage and
consequently (T + D) increases year by year
with increased usage. (D + d) on the other
hand will be a fixed per annum cost for
unlimited usage. There are no usage charges.
FAQ1(Contd.)
25. In PVDTN over the same point-to-point leased
line backbone we have two separate and
distinct networks running.
A circuit switched network for voice and fax
communications through the VDPS (EPAX
with E&M trunk cards).
A packet switched IP network through the
data routers sitting on the computer LAN at
each location.
The bandwidths for each network are provided
by the channels splitter at each location.
The above are clearly explained in Slide 2, of
PVDTN Presentation.
Thus your present voice communication team
will look after the circuit switched voice and fax
network for inter-locational communications and
the PSTN infrastructure already in place.
The IT / data communications team will
administer the packet switched IP data network
through the data routers and the PVDTN WAN,
and also the Internet connectivity
Thus there is no conflict of roles or interest of
either group of people.
In our company the voice and fax
services are looked after by one group,
and the data services are looked after by
another group. Since PVDTN is an
integrated voice / fax / data network what
will happen to this arrangement?
FAQ 2
26. In VOIP (voice over IP) the actual bandwidth
required per each call through the WAN is 90 to
100 kbps. In the circuit switched network the
bandwidth required for each call through the circuit
switched WAN is either 12.8 kbps or 24 kbps
depending on the multiplexers (channel splitter)
being used.
Thus considerably larger link bandwidth is required
for VOIP leading to higher operating costs. Use of
PVDTN integration will reduce the link
bandwidth and hence the operating cost.
Irrespective of VOIP or PVDTN integration the
number of simultaneous calls to be provided in any
WAN link is determined by Erlang loading, which is
the number of extensions to be served by each
trunk (WAN call). This could vary from 1:6 (for very
busy locations), to 1:10 (for normal locations as in a
standard PSTN network). For most multi-locational
organisations (MLOs) 1:8 is a good Erlang loading
ratio.
Thus if there are 96 users of NET telephones in a
location based on Erlang loading of 1:8, there
should be 12 simultaneous WAN calls or trunks
provided for. These may be distributed over all the
lines terminating at the location.
We have already implemented voice
integration over our existing data network
using VOIP (voice over IP). How can PVDTN
improve on this?
FAQ 3
27. The total bandwidth required for evacuating
these simultaneous WAN calls will be 1200
kbps for VOIP and 154 or 288 kbps for PVDTN.
If the appropriate bandwidths are not provided
in VOIP it will amount to bandwidth jamming
and resulting unsatisfactory speech quality.
And in PVDTN it could cause blocking of
communications.
Provision of the appropriate bandwidth ensures
unblocked communications in PVDTN and
satisfactory speech quality in VOIP.
In most VOIP implementations this aspect is
overlooked resulting in bandwidth jamming and
unsatisfactory speech quality.
This is what prompts the NET phone users to
fall back on their PSTN phones to speak to
their colleagues in other organisation locations,
increasing telephony costs.
In PVDTN bandwidth provision is always
optimum resulting in unblocked toll quality
(normal telephone like) speech. Thus PSTN
calls to other company locations are totally
eliminated.
FAQ 3 (Contd.)
28. FAQ 4
How do we run our Web based collaboration tools on
PVDTN?
♦ PVDTN is a combination of two parallel
networks.
♦ A circuit switched network for normal
telephony and fax communications
(synchronous communications)
♦ An IP packet switching network for data and
and other IP communications (asynchronous
communications).
♦ All collaboration tools and software will run on
the IP network for collaboration within the
organisation, with the software residing in a
server housed within the Intranet. This may be
done using Novell Teaming and Conferencing ,
Microsoft Share Point, etc.
♦ For collaborative work with the outside world –
clients, vendors, consultants, the Internet would
be used through the IBN (Internet Browsing
Nodes). For this there are two options.
♦ Use Web based meeting portals like
Mediatone Networks Webex (there are
several other similar shared collaboration
solutions portals).
♦ Set up your own Web based collaboration
server in the Company’s Web based Public
server and carry out collaborative activity
with the Company’s clients ,vendors,
consultants, business partners. This may be
done using Novell Teaming and
Conferencing, Microsoft Share Point, etc.