lect23 - 1.264 Lecture 23 Telecom Enterprise networks MANs,...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
1.264 Lecture 23 Telecom Enterprise networks MANs, WANs
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients… Principles of enterprise network design Standards based Secure Reliable: disruptions affect all external connections Quality of service: latency, throughput, services,
Background image of page 2
Building blocks of enterprise network Local area networks Wide- or metro-area networks Private lines (point to point circuits) Ethernet over carrier fiber in metro areas Virtual private net (VPN) over Internet Frame relay or cell switched (ATM, MPLS) network Voice network Integrated with data network Private lines shared between data and voice Voice carried over IP, ATM or MPLS network
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Data virtual private networks (VPN) Figure by MIT OCW.
Background image of page 4
Virtual private networks (VPNs) Set of sites that Communicate over the open Internet but With the security and management capabilities of: Dedicated circuit or frame relay network VPN basic functions Membership discovery (identity, authorization) Establishment of secure tunnel (path) in network VPN objectives Security Connectivity: authorized sites, new users, mobile users Simplicity: applications work without modification Quality
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
VPNs A tunnel encapsulates data of one protocol inside the data field of another protocol In a VPN, we encrypt corporate data inside the IP data field The corporate data is encrypted via the VPN’s security protocol (symmetric, asymmetric keys, message digests…) VPNs operate either at layer 2 or layer 3 Layer 3: most common, routers use IP information to route Layer 2: uses Ethernet addresses; corporation responsible for routing packets across LANs Company can lease lines, buy routers and run its own ‘Internet’ Difficult to do; many nodes will be connected to Internet Company can purchase VPN service from carrier Often cheaper, easier, but not always
Background image of page 6
VPNs Intranet
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/06/2011 for the course ESD 1.264j taught by Professor Georgekocur during the Fall '06 term at MIT.

Page1 / 18

lect23 - 1.264 Lecture 23 Telecom Enterprise networks MANs,...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online