SlideShare a Scribd company logo
DEPLOYMENT OF NEXT
GENERATION TELECOM
TRANSPORT NETWORK
CONTENTS
•
•
•
•
•
•
•
•
•
•
•
•
•

INTRODUCTION
OBJECTIVES
LITERATURE SURVEY
PROBLEM DEFINITION
FLOW CHART
ROUTING PROTOCOL
BLOCK DIAGRAM
SERVER CONFIGURATION
HARDWARE CONFIGURATION
ROUTER vs. SWITCH
IPv4 vs. IPv6
SECURITY
REFERENCES
INTRODUCTION
• Evolution
of
Packet
based
telecom network from circuit
based network.
• Supports voice, video with audio
and data .
• Configuration of
secure network.

an

optimally

• Provides service to a larger
group of internet users at the
OBJECTIVE
• The main objective of the project
is to form a network which will
offer IPv6(next generation)
services for new users(IPv6) as
well as the existing users(IPv4) i.e.
there will be co-existence of both
versions of IP.
• Successful deployment of IPv6
network.
• Configuring firewall at network
LITERATURE
SURVEY
YEAR OF
PUBLISH

PAPER TITLE

RESEARCHER/
AUTHOR

TECHNIQUES WITH PERFORMANCE

2012
Internationa
l Conference
on
Information
Society (iSociety 2012)

Necessity to
Migrate to
IPv6

Rahathullah Khan
Hussain Fouad Sindi

This paper describes the
migration from the current
Internet Protocol (IPv4) to the
next generation of Internet
Protocol (IPv6) and to adapt
the new technologies which
probably grows into our
networks.

2011
Fourth
Internationa
l Conference
on
Intelligent
Computation
Technology
and
Automation

The Research
and
Application
of Internet
Protocol
Version 6
(IPv6)

Zhenqi Wang, Mei
Yan
North China
Electric Power
University,
Baoding, Hebei,
071003, China
yanmeimm@126.com

With the rapid development of
the applications based on
Internet, the traditional
network of based IPv4
protocol has
been overwhelmed, and IPv6
protocol becomes the
dominant protocol for the
next generation Internet.
LITERATURE
SURVEY
YEAR OF
PUBLISH

PAPER TITLE

RESEARCHER/
AUTHOR

TECHNIQUES WITH
PERFORMANCE

2010
Technologies
for Homeland
Security (HST),
2010 IEEE
International
Conference

Securing IPv6
network
infrastructur
e: A new
security
model

Choudhary. A.R.
SEGMA Technol.
Inc., Silver
Spring, MD, USA
Sekelsky, A.

• It briefly presents the new
IPv6 capabilities.
• It presents a analysis of the
security vulnerabilities
arising from these
capabilities
• It presents a new security
model for IPv6 network
infra. that has the potential
to mitigate these
vulnerabilities.

2009
2009
International
Conference on
Communicatio
n Software
and Networks

Design and
Implementati
on of
Distributed
Firewall
System for
IPv6

Yingxu Lai,
Guangzhi Jiang,
Jian Li, Zhen Yang,
Department of
Information
Security Institute
of Computer
Science, Beijing

This paper
introduces the
implementation of
Distributed Firewall System
(DFS) that can be applicable
to the IPv6 network and has
capabilities of processing
encrypted IPSec packet.
LITERATURE
SURVEY
YEAR OF
PUBLISH

PAPER TITLE

RESEARCHER/
AUTHOR

TECHNIQUES WITH PERFORMANCE

2011
Network
Protocols
(ICNP), 2011 19th
IEEE
International
Conference on
17-20 Oct. 2011

IPv6
evolution,
stability and
deployment

Xiaoke Jiang
Networking is growing with
Dept. of
rising
exponential
pace.
Comput. Sci.,
Network itself and its routing
Tsinghua Univ.,
system become more and more
Beijing, China
stable. And here they have
Bi, Jun ;
explored special properties
Yangyang Wang ; of this preliminary network,
Zhijie He ; Wei
to provide data which help
Zhang ;
deploy IPv6.
Hongchen Tian

2008
Southeastcon,
2008. IEEE .
3-6 April 2008

An
examination
of IPv4 and
IPv6 networks
: Constraints
and various
transition
mechanisms

Jivika Govil
Maharshi
Dayanand Univ.,
Delhi
Jivesh Govil ;
Kaur, N. Kaur,
H.

• This paper discusses
constraints, various techniques
and standards require for high
level compatibility smooth
transition between IPv4 and
IPv6 by removing the
constraints.
• It is impossible to switch the
entire internet over to IPv6
PROBLEM
DEFINITION
• In IPv4 networks IDs allocation is very
critical.
• IPv6 is required because of the fast
depletion of IPv4 addresses.
• Apart from this it is also necessary to
implement an optimal security system
in any network
•

Securing
data
while
they
are
transmitted from server to client.
FLOW CHART
Study of various protocols &
applications of the project
Configuring and connecting hardware
peripherals in IPv4
Software configuration of the server

Performing same procedure for IPv6

Implementing data security on packet data

Testing Services & network connectivity
ROUTING PROTOCOL
OSPF: Open Shortest Path First
• Is a link-state routing protocol
• Suitable for serving large,
heterogeneous internetworks.
• OSPF can calculate the routes in a
short amount of time.
• Link-state advertisements (LSA)
Fig.1
OSPF
Serv
er
side

Clie
nt
side

Fig.2 BLOCK
DIAGRAM
SERVER

CONFIGURATIONS
• DNS SERVER
DNS will assign domain names to each IP
address.

• FTP SERVER
Transfer files from one system to
another system.

• EMAIL SERVER
Used to communicate with clients in a
company.

• WEB SERVER
Web server is use to host websites.

• VOIP SERVER
Used for placing and transmitting
HARDWARE CONFIGURATIONS
• ROUTERS
A router is a device that forwards data
packets between
computer networks
It ensures that information doesn't go
where it's not needed.
NETWORK

2
10.1.1.0/ 255.255.255.0

NETWORK 1

ROUTER
NETWORK

10.0.1.0/ 255.255.255.0

3
10.2.1.0/ 255.255.255.0

Fig. 3
Routing
HARDWARE CONFIGURATIONS
•

SWITCHES
A switch, keeps a record of the MAC
addresses of all the devices connected to it.
With this information, a switch can identify
which system is sitting on which port. So
when a frame is received, it knows exactly
which port to send it to.

CISCO 2960 SWITCH

Footer Text

Fig.4
Switching
Router vs. Switch
ROUTER

SWITCH

Operates at network layer of
OSI model

Operates at data layer of OSI
model

Connect to one or more
network

Connects devices in a LAN

Consist of a combination of
hardware and software

Uses switching table to find the
correct destination

Data is grouped into packets
It has buffer for each link which
which has a physical and logical stores the data until that
address.
particular link is free.
Keeps a tale of IP Addresses

Keeps a table of known MAC
addresses
IPv4 vs. IPv6
IPv4

IPv6

Source and destination addresses Source and destination addresses
are 32 bits (4 bytes) in length.
are 128 bits (16 bytes) in length.
IPv6 address is written as
IP address is written as 8.8.8.8

FABC:AC77:7834:2222:FACB:
AB98:5432:4567

Must be configured manually or
through DHCP

Does not require manual
configuration

IPv4 header has checksum which
must be compared by each
router

IPv6 has no header checksum

Security in IPv4 networks is
limited to tunnelling between
two networks

IPv6 has been designed to satisfy
the growing and expanded need
for network security

Classes: Class A B C D E

Classes: Unicast Anycast
HARDWARE CONFIGURATIONS
• FIREWALL
•

Used to help keep a network secure.

•

Can be either software-based or
hardware-based.

•

To control the incoming and outgoing
network traffic.

Fig.5
Security
SECURITY
DMZ Technique
• DMZ or Demilitarized Zone
• Contains and exposes an organization's
external-facing services to an untrusted
network, usually the Internet.
• Adds an additional layer of security to an
organization's LAN

Fig.6 DMZ Concept
REFERENCES
[1] Necessity to Migrate to IPv6,Rahathullah
Khan,Hussain Fouad Sindi,International Conference
on Information Society (i-Society 2012)
[2] Design and Implementation of Distributed Firewall
System for IPv6,Yingxu Lai, Guangzhi Jiang, Jian Li,
Zhen Yang 2009 International Conference on
Communication Software and Networks
[3] The Research and Application of Internet Protocol
Version 6 (IPv6) Zhenqi Wang, Mei Yan 2011,Fourth
International Conference on Intelligent Computation
Technology and Automation
[4]Efficient Security for data using cryptographic
protocol,Vaishnavi .R, Janarthan R INCACEC,2009 IEEE
International Conference
[5]Data Security in packet switched network,
REFERENCES
[6]Transition from IPv4 to IPv6: A state of art
survey,IEEE Communication Survey,Third
quarter 2013..
[7] CCNA : Cisco Certified Network Associate Study
Guide (Exam 640802) , 6th Edition, Todd
Lammle, By Wiley Publications,2007, retrieved
on 10th October 2012.
[8]Computers Networks(5th Addition) : Andrew S.
Tanenbaum.
[9]Data Communication And Networking: Behrouz
A Forouzan.
Thank
You…

More Related Content

What's hot

NZNOG 2020 - The Trouble With NAT
NZNOG 2020 - The Trouble With NATNZNOG 2020 - The Trouble With NAT
NZNOG 2020 - The Trouble With NATMark Smith
 
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)SDNRG ITB
 
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...ijceronline
 
Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 
Presentation on networking
Presentation on networking Presentation on networking
Presentation on networking HoneyKumar34
 
CCNA
CCNACCNA
CCNAniict
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTsulaiman_karim
 
6TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 20156TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 2015Pascal Thubert
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
RINA as a Clean-Slate Approach to Software Networks
RINA as a Clean-Slate Approach to Software Networks RINA as a Clean-Slate Approach to Software Networks
RINA as a Clean-Slate Approach to Software Networks ICT PRISTINE
 
Ccna r&s overview presentation
Ccna r&s overview presentationCcna r&s overview presentation
Ccna r&s overview presentationpersonal
 

What's hot (19)

Pro Viva Emmanuel
Pro Viva EmmanuelPro Viva Emmanuel
Pro Viva Emmanuel
 
NZNOG 2020 - The Trouble With NAT
NZNOG 2020 - The Trouble With NATNZNOG 2020 - The Trouble With NAT
NZNOG 2020 - The Trouble With NAT
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
 
Ccna (200 125)
Ccna (200 125)Ccna (200 125)
Ccna (200 125)
 
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
 
IoT Connectivity
IoT Connectivity IoT Connectivity
IoT Connectivity
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
 
Presentation on networking
Presentation on networking Presentation on networking
Presentation on networking
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
CCNA
CCNACCNA
CCNA
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoT
 
6TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 20156TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 2015
 
Introduction to SDN and NFV
Introduction to SDN and NFVIntroduction to SDN and NFV
Introduction to SDN and NFV
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
RINA as a Clean-Slate Approach to Software Networks
RINA as a Clean-Slate Approach to Software Networks RINA as a Clean-Slate Approach to Software Networks
RINA as a Clean-Slate Approach to Software Networks
 
Ccna r&s overview presentation
Ccna r&s overview presentationCcna r&s overview presentation
Ccna r&s overview presentation
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 

Similar to Slideshare

Migration of corperate networks from ipv4 to ipv6 using dual stack
Migration of corperate networks from ipv4 to ipv6 using dual stackMigration of corperate networks from ipv4 to ipv6 using dual stack
Migration of corperate networks from ipv4 to ipv6 using dual stackpraveenReddy268
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processorsaciijournal
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processorsaciijournal
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processorsaciijournal
 
CCNA(R&S) By Ezxprt
CCNA(R&S) By EzxprtCCNA(R&S) By Ezxprt
CCNA(R&S) By EzxprtEzxprt
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)ateeq85905
 
Future Internet: Managing Innovation and Testbed
Future Internet: Managing Innovation and TestbedFuture Internet: Managing Innovation and Testbed
Future Internet: Managing Innovation and TestbedShinji Shimojo
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]Avijit Nath
 
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORSA COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORSaciijournal
 
Communication Technologies in IOT.pptx
Communication Technologies in IOT.pptxCommunication Technologies in IOT.pptx
Communication Technologies in IOT.pptx20CE112YASHPATEL
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-networklklokesh
 
Final_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxFinal_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxjainam bhavsar
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SAMeh Zaghloul
 
Readying the campus for the internet of things (io t) - Networkshop44
Readying the campus for the internet of things (io t) - Networkshop44Readying the campus for the internet of things (io t) - Networkshop44
Readying the campus for the internet of things (io t) - Networkshop44Jisc
 
Software defined networking(sdn) vahid sadri
Software defined networking(sdn) vahid sadriSoftware defined networking(sdn) vahid sadri
Software defined networking(sdn) vahid sadriVahid Sadri
 
JesusLopez-VitaeCurricular2016
JesusLopez-VitaeCurricular2016JesusLopez-VitaeCurricular2016
JesusLopez-VitaeCurricular2016Jesus Lopez
 

Similar to Slideshare (20)

main_phase1 _3.pptx
main_phase1 _3.pptxmain_phase1 _3.pptx
main_phase1 _3.pptx
 
Migration of corperate networks from ipv4 to ipv6 using dual stack
Migration of corperate networks from ipv4 to ipv6 using dual stackMigration of corperate networks from ipv4 to ipv6 using dual stack
Migration of corperate networks from ipv4 to ipv6 using dual stack
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
 
CCNA(R&S) By Ezxprt
CCNA(R&S) By EzxprtCCNA(R&S) By Ezxprt
CCNA(R&S) By Ezxprt
 
ccna presentation
ccna presentationccna presentation
ccna presentation
 
Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)Ccnapresentation 13020219098042-phpapp02 (1)
Ccnapresentation 13020219098042-phpapp02 (1)
 
Future Internet: Managing Innovation and Testbed
Future Internet: Managing Innovation and TestbedFuture Internet: Managing Innovation and Testbed
Future Internet: Managing Innovation and Testbed
 
Ccna presentation{complete]
Ccna presentation{complete]Ccna presentation{complete]
Ccna presentation{complete]
 
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORSA COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
 
Communication Technologies in IOT.pptx
Communication Technologies in IOT.pptxCommunication Technologies in IOT.pptx
Communication Technologies in IOT.pptx
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-network
 
Final_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxFinal_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptx
 
Feec telecom-nw-softwarization-aug-2015
Feec telecom-nw-softwarization-aug-2015Feec telecom-nw-softwarization-aug-2015
Feec telecom-nw-softwarization-aug-2015
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
 
BuildingSDNmanageableswitch.pdf
BuildingSDNmanageableswitch.pdfBuildingSDNmanageableswitch.pdf
BuildingSDNmanageableswitch.pdf
 
Readying the campus for the internet of things (io t) - Networkshop44
Readying the campus for the internet of things (io t) - Networkshop44Readying the campus for the internet of things (io t) - Networkshop44
Readying the campus for the internet of things (io t) - Networkshop44
 
Software defined networking(sdn) vahid sadri
Software defined networking(sdn) vahid sadriSoftware defined networking(sdn) vahid sadri
Software defined networking(sdn) vahid sadri
 
JesusLopez-VitaeCurricular2016
JesusLopez-VitaeCurricular2016JesusLopez-VitaeCurricular2016
JesusLopez-VitaeCurricular2016
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Slideshare

  • 1. DEPLOYMENT OF NEXT GENERATION TELECOM TRANSPORT NETWORK
  • 2. CONTENTS • • • • • • • • • • • • • INTRODUCTION OBJECTIVES LITERATURE SURVEY PROBLEM DEFINITION FLOW CHART ROUTING PROTOCOL BLOCK DIAGRAM SERVER CONFIGURATION HARDWARE CONFIGURATION ROUTER vs. SWITCH IPv4 vs. IPv6 SECURITY REFERENCES
  • 3. INTRODUCTION • Evolution of Packet based telecom network from circuit based network. • Supports voice, video with audio and data . • Configuration of secure network. an optimally • Provides service to a larger group of internet users at the
  • 4. OBJECTIVE • The main objective of the project is to form a network which will offer IPv6(next generation) services for new users(IPv6) as well as the existing users(IPv4) i.e. there will be co-existence of both versions of IP. • Successful deployment of IPv6 network. • Configuring firewall at network
  • 5. LITERATURE SURVEY YEAR OF PUBLISH PAPER TITLE RESEARCHER/ AUTHOR TECHNIQUES WITH PERFORMANCE 2012 Internationa l Conference on Information Society (iSociety 2012) Necessity to Migrate to IPv6 Rahathullah Khan Hussain Fouad Sindi This paper describes the migration from the current Internet Protocol (IPv4) to the next generation of Internet Protocol (IPv6) and to adapt the new technologies which probably grows into our networks. 2011 Fourth Internationa l Conference on Intelligent Computation Technology and Automation The Research and Application of Internet Protocol Version 6 (IPv6) Zhenqi Wang, Mei Yan North China Electric Power University, Baoding, Hebei, 071003, China yanmeimm@126.com With the rapid development of the applications based on Internet, the traditional network of based IPv4 protocol has been overwhelmed, and IPv6 protocol becomes the dominant protocol for the next generation Internet.
  • 6. LITERATURE SURVEY YEAR OF PUBLISH PAPER TITLE RESEARCHER/ AUTHOR TECHNIQUES WITH PERFORMANCE 2010 Technologies for Homeland Security (HST), 2010 IEEE International Conference Securing IPv6 network infrastructur e: A new security model Choudhary. A.R. SEGMA Technol. Inc., Silver Spring, MD, USA Sekelsky, A. • It briefly presents the new IPv6 capabilities. • It presents a analysis of the security vulnerabilities arising from these capabilities • It presents a new security model for IPv6 network infra. that has the potential to mitigate these vulnerabilities. 2009 2009 International Conference on Communicatio n Software and Networks Design and Implementati on of Distributed Firewall System for IPv6 Yingxu Lai, Guangzhi Jiang, Jian Li, Zhen Yang, Department of Information Security Institute of Computer Science, Beijing This paper introduces the implementation of Distributed Firewall System (DFS) that can be applicable to the IPv6 network and has capabilities of processing encrypted IPSec packet.
  • 7. LITERATURE SURVEY YEAR OF PUBLISH PAPER TITLE RESEARCHER/ AUTHOR TECHNIQUES WITH PERFORMANCE 2011 Network Protocols (ICNP), 2011 19th IEEE International Conference on 17-20 Oct. 2011 IPv6 evolution, stability and deployment Xiaoke Jiang Networking is growing with Dept. of rising exponential pace. Comput. Sci., Network itself and its routing Tsinghua Univ., system become more and more Beijing, China stable. And here they have Bi, Jun ; explored special properties Yangyang Wang ; of this preliminary network, Zhijie He ; Wei to provide data which help Zhang ; deploy IPv6. Hongchen Tian 2008 Southeastcon, 2008. IEEE . 3-6 April 2008 An examination of IPv4 and IPv6 networks : Constraints and various transition mechanisms Jivika Govil Maharshi Dayanand Univ., Delhi Jivesh Govil ; Kaur, N. Kaur, H. • This paper discusses constraints, various techniques and standards require for high level compatibility smooth transition between IPv4 and IPv6 by removing the constraints. • It is impossible to switch the entire internet over to IPv6
  • 8. PROBLEM DEFINITION • In IPv4 networks IDs allocation is very critical. • IPv6 is required because of the fast depletion of IPv4 addresses. • Apart from this it is also necessary to implement an optimal security system in any network • Securing data while they are transmitted from server to client.
  • 9. FLOW CHART Study of various protocols & applications of the project Configuring and connecting hardware peripherals in IPv4 Software configuration of the server Performing same procedure for IPv6 Implementing data security on packet data Testing Services & network connectivity
  • 10. ROUTING PROTOCOL OSPF: Open Shortest Path First • Is a link-state routing protocol • Suitable for serving large, heterogeneous internetworks. • OSPF can calculate the routes in a short amount of time. • Link-state advertisements (LSA)
  • 13. SERVER CONFIGURATIONS • DNS SERVER DNS will assign domain names to each IP address. • FTP SERVER Transfer files from one system to another system. • EMAIL SERVER Used to communicate with clients in a company. • WEB SERVER Web server is use to host websites. • VOIP SERVER Used for placing and transmitting
  • 14. HARDWARE CONFIGURATIONS • ROUTERS A router is a device that forwards data packets between computer networks It ensures that information doesn't go where it's not needed. NETWORK 2 10.1.1.0/ 255.255.255.0 NETWORK 1 ROUTER NETWORK 10.0.1.0/ 255.255.255.0 3 10.2.1.0/ 255.255.255.0 Fig. 3 Routing
  • 15. HARDWARE CONFIGURATIONS • SWITCHES A switch, keeps a record of the MAC addresses of all the devices connected to it. With this information, a switch can identify which system is sitting on which port. So when a frame is received, it knows exactly which port to send it to. CISCO 2960 SWITCH Footer Text Fig.4 Switching
  • 16. Router vs. Switch ROUTER SWITCH Operates at network layer of OSI model Operates at data layer of OSI model Connect to one or more network Connects devices in a LAN Consist of a combination of hardware and software Uses switching table to find the correct destination Data is grouped into packets It has buffer for each link which which has a physical and logical stores the data until that address. particular link is free. Keeps a tale of IP Addresses Keeps a table of known MAC addresses
  • 17. IPv4 vs. IPv6 IPv4 IPv6 Source and destination addresses Source and destination addresses are 32 bits (4 bytes) in length. are 128 bits (16 bytes) in length. IPv6 address is written as IP address is written as 8.8.8.8 FABC:AC77:7834:2222:FACB: AB98:5432:4567 Must be configured manually or through DHCP Does not require manual configuration IPv4 header has checksum which must be compared by each router IPv6 has no header checksum Security in IPv4 networks is limited to tunnelling between two networks IPv6 has been designed to satisfy the growing and expanded need for network security Classes: Class A B C D E Classes: Unicast Anycast
  • 18. HARDWARE CONFIGURATIONS • FIREWALL • Used to help keep a network secure. • Can be either software-based or hardware-based. • To control the incoming and outgoing network traffic. Fig.5 Security
  • 19. SECURITY DMZ Technique • DMZ or Demilitarized Zone • Contains and exposes an organization's external-facing services to an untrusted network, usually the Internet. • Adds an additional layer of security to an organization's LAN Fig.6 DMZ Concept
  • 20. REFERENCES [1] Necessity to Migrate to IPv6,Rahathullah Khan,Hussain Fouad Sindi,International Conference on Information Society (i-Society 2012) [2] Design and Implementation of Distributed Firewall System for IPv6,Yingxu Lai, Guangzhi Jiang, Jian Li, Zhen Yang 2009 International Conference on Communication Software and Networks [3] The Research and Application of Internet Protocol Version 6 (IPv6) Zhenqi Wang, Mei Yan 2011,Fourth International Conference on Intelligent Computation Technology and Automation [4]Efficient Security for data using cryptographic protocol,Vaishnavi .R, Janarthan R INCACEC,2009 IEEE International Conference [5]Data Security in packet switched network,
  • 21. REFERENCES [6]Transition from IPv4 to IPv6: A state of art survey,IEEE Communication Survey,Third quarter 2013.. [7] CCNA : Cisco Certified Network Associate Study Guide (Exam 640802) , 6th Edition, Todd Lammle, By Wiley Publications,2007, retrieved on 10th October 2012. [8]Computers Networks(5th Addition) : Andrew S. Tanenbaum. [9]Data Communication And Networking: Behrouz A Forouzan.